Introduction
This section provides an overview of the Fortified Central Command (FORTIFIED CENTRAL COMMAND) application, describes different ways to access FORTIFIED CENTRAL COMMAND depending on the assigned authorization type, and clarifies user roles and user permissions.
Related Topics