12.0 Using iChain Access Control Rules

This section discusses the rules that control user access. The following topics are discussed: