This section discusses the security setup for example organizations and explains what individual users are allowed to do on the CRM system. By far these examples do not include all possibilities to configure the CRM system based on a company's needs. However, we believe that the principal functions of the security features are covered so that any user might become capable to create their setup.

Admin Manual
Developer Manual