Security and database configuration

You use the applications in the security module to implement and to manage security for users and groups. You use the Database Configuration application to perform different actions, such as configuring the GL account and applying configuration changes.