Sales Overview
51
Scenario: A Day in the Life of a Security Administrator
32. Select John_Adams, and the system adds this user to the Access Role:
Figure 31 — Access Role - Users Configured
33. Click OK, to save the Access Role configuration.
34. Now that you have created a new Access Role for the remote user, add the role
to an existing access rule.
Note:
When the user returns from the conference, you can simply remove the
role to deny him remote access.