Security example

This example describes a business process, analyzes the work performed by various users, and describes how to create groups, document classes, and folders to achieve appropriate security.

Imagine a credit card approval process where: