Differenze tra le versioni di "Get started with itmSUITE®"
Da itm wiki.
(→Overview) |
|||
Riga 34: | Riga 34: | ||
{{colonne spezza}} | {{colonne spezza}} | ||
− | == | + | ==Basic configuration== |
− | + | Preliminary and cross module components configuration | |
− | * [[ | + | * [[itmSUITE® - Introduction to basic configuration|Introduction]] |
− | * [[ | + | * [[itmSUITE® - System settings configuration|System settings]] |
− | * [[ | + | * [[itmSUITE® - Company configuration|Company]] |
+ | * [[itmSUITE® - Cross master data configuration|Cross master data]] | ||
+ | * [[itmSUITE® - Users and resources configuration|Users and resources]] | ||
+ | * [[itmSUITE® - Notification system configuration|Notification]] | ||
: [[More|[More]]] | : [[More|[More]]] | ||
− | == | + | ==Core modules configuration== |
Administration forms and lists | Administration forms and lists | ||
* [[Personalizing forms]] | * [[Personalizing forms]] | ||
Riga 48: | Riga 51: | ||
: [[More|[More]]] | : [[More|[More]]] | ||
− | == | + | ==Cross modules configuration== |
+ | Control system and data security | ||
+ | * [[User Access Control Rutes]] | ||
+ | * [[Domain Separation Support]] | ||
+ | * [[High Security Settings]] | ||
+ | : [[More|[More]]] | ||
+ | |||
+ | ==Preliminary modules configuration== | ||
Control system and data security | Control system and data security | ||
* [[User Access Control Rutes]] | * [[User Access Control Rutes]] | ||
Riga 57: | Riga 67: | ||
{{colonne fine}} | {{colonne fine}} | ||
− | [[category: | + | [[category:itmSUITE®]] |
Versione delle 22:09, 9 mar 2015
This section is aimed at helping you to quickly start with itmSUITE®.
OverviewIntroduction to itmSUITE® features Preliminary stepsPrepare to install and deploy itmSUITE® InstallationInstallation of itmSUITE® components |
Basic configurationPreliminary and cross module components configuration Core modules configurationAdministration forms and lists Cross modules configurationControl system and data security Preliminary modules configurationControl system and data security |