System Security and User Management

Creating New Users

Assigning Users to Companies

Application Security Setup

Role Based Security for Analytics Logs and Queries