Cybersecurity
DevOps Cloud
IT Operations Cloud
We will create the RLC 6.1 groups, add users to the groups, give permissions to the 3 special AUX tables (RLC Custom Columns, RLC Deployment Log, and RLC DU Execution Log), and assign roles to each of the groups.