By tenyjemes on
Apr. 23, 2011
United States
Basically users or groups get put into roles based on how ever you define the roles. Then apply the correct security to the roles. Users can be in more than one role and will pickup the permissions from all the roles that they belong to.