Introduction

This chapter assumes that you have the permissions required for all involved operations. For details about permissions, see Permissions Description.