This article explains Aspire security setup that determines what access individual users have to your Aspire system.
It also provides a list of the individual permissions that determine access to specific system functionality along with detailed descriptions of those permissions.
Click Security Setup and Role Permissions to read the article.