Introduction

This section provides an overview of the Fortified Central Command (FORTIFIED CENTRAL COMMAND) application, describes different ways to access FORTIFIED CENTRAL COMMAND depending on the assigned authorization type, and clarifies user roles and user permissions.

Related Topics

Overview

Accessing the Application

User Roles and Permissions