Quiz

 

  • What are the uses of the Role configuration object?
  • How does one create a role using configuration subsystems?
  • How does one create a user list and specify user rights?
  • What is the difference between 1C:Enterprise authentication and operating system authentication?
  • How does one create database record- and field-level restrictions?

Comments
0
Add comment