• Access to management features available on the devices that users are authorized to access:
•
• Note: The administrator may create and enable a custom security profile that has the “override authorization” feature set, which causes all authenticated users to have all access to all connected devices. For details, see Security Profiles’ Effects on Users’ Actions.