Tokens Good to Know
Use these tips for helpful information on tokens.
- The following features can be used as tokens while not being limited strictly to token functionality:
- Security rights control access to CSM functionality and are configured in the Security Group Manager in CSM Administrator (Security > Edit Security Groups). For more information, see Security rights.
Before using tokens, users need security rights for the following:
- Stored Values
For more information, see Security rights reference.