When building applications, user roles require various levels of security access. A manager is able to review submitted forms, but an administrator can delete them. The following topics describe how to set security levels for all levels of users.

Leap allows application designers to compose applications that combine user interfaces, data records, and a stages-based lifecycle. The Leap security settings govern access to applications and data by defining who can edit, maintain, deploy applications, and access data for submitted forms.

You can define your security rules using the Access tab from within the Design environment. These topics describe the Leap security concepts and how to use the Access tab to grant access to users in your organization.