For information on... | See... |
---|---|
middle-tier application user requirements | Working with Middle-Tier Application Users. |
assigning security constraints to permanent users and profiles | Working with Constraint Assignments. |
how the system processes constraint assignments for proxy users | Session Constraint Values for Trusted User Applications and Proxy Users. |