Mapped Security

This section describes how to set up mapped security for information that is extracted from a file system.

_FT_HTML5_bannerTitle.htm