PI System Management Tools Security vs. Database Security

Is there a link between the Database Security tool and the permissions granted to users? I'm looking for a one to one link, so if I wanted to control who has access to the IT Points tools, would there be a corresponding database security table with r/w?

 

I'm just picking on IT Points in this example, but I would like to see a breakdown of each of the tools and how we grant access to them via r/w. Again, I know I can see the database security tables but those don't necessarily point to which tools a user can access or r/w with.

Parents Reply Children
No Data