What do you want to do?
- Learn the Advantages of Restricting Program Access
- Plan Your User Names and Passwords
- Set Up Your Users and Their Passwords
- Assign Program Access and Privileges
- Set Up a User's Preferences
- Set the Required Login Information for Users (Security Method)
- Disable All Passwords in the Program