Access and user administrationAccess and user administration
There is a role-based, central authentication and registration for the access to applications. More information about the certificate, request access authorization and user administration can be found on the following page.
Read more