Users require no special privileges to run GT.M beyond standard system access and suitable access to relevant application and database files. All the standard UNIX/OpenVMS security features are available to protect GT.M resources.
FIS strongly recommends a security design where each user has no more authorizations than they require to do their assigned roles and each user's actions are distinguishable in an audit.
![]() | |
System account access is required to install GT.M, but not to use it. |