- What are the uses of the Role configuration object?
- How does one create a role using configuration subsystems?
- How does one create a user list and specify user rights?
- What is the difference between 1C:Enterprise authentication and operating system authentication?
- How does one create database record- and field-level restrictions?