Click the image itself for a larger version.
You control program security through a group setup. You create logins which are placed in groups. Next, each group is given specific access to parts of the program. Thus, not all users get access to things like the configuration menu.