• What are the uses of the Role configuration object?
  • How does one create a role using configuration subsystems?
  • How does one create a user list and specify user rights?
  • What is the difference between 1C:Enterprise authentication and operating system authentication?
  • How does one create database record- and field-level restrictions?
Go to the next lesson: Lesson 23 (1:10). Start page and command interface customization
Be the first to know tips & tricks on business application development!

A confirmation e-mail has been sent to the e-mail address you provided .

Click the link in the e-mail to confirm and activate the subscription.