Access to the application is granted by your organization's application administrator. You will need the URL defined by your organization, a valid username, and password to log in to the system.
Security settings assigned to each user apply upon login. Some areas and application functions are permission based, this means if you do not see an area, an object, or a function is grayed out, then access to that area or object has been prohibited.
Important: This documentation refers to transactions by their default names. Your administrator can change these names to conform with your business practices.1