Through user management control, who can access the document?
VIP invokes your authentication process, i.e. LDAP and/or Active Directory, eDirectory, including multi-factor authentication, so that all access control is setup once and centrally managed. This capability is executed via Security Policies that are associated to document groups. In this way, the security level of the data in the document can match the security level of the data when it is at rest.