The following table explains policies governing Enterprise and Group Authenticator rights and privileges.
| 
 Policy Name  | 
 Description  | 
 Value Range and Default  | 
|---|---|---|
| 
 Add Devices  | 
 Specify whether Enterprise and Group Authenticators are allowed to add devices.  | 
 Yes, No Default: No  | 
| 
 Add Users  | 
 Specify whether Enterprise and Group Authenticators are allowed to add new users.  | 
 Yes, No Default: No  | 
| 
 Add Users to Enterprise  | 
 Specify whether Enterprise and Group Authenticators are allowed to add new users to the enterprise.  | 
 Yes, No Default: No  | 
| 
 Add/Modify Groups  | 
 Specify whether Enterprise and Group Authenticators are allowed to add/modify subgroups.  | 
 Yes, No Default: No  | 
| 
 Copy/Paste Groups  | 
 Specify whether Enterprise and Group Authenticators are allowed to copy and paste subgroups.  | 
 Yes, No Default: No  | 
| 
 Remove Devices  | 
 Specify whether Enterprise and Group Authenticators are allowed to remove devices.  | 
 Yes, No Default: No  | 
| 
 Remove Groups  | 
 Specify whether Enterprise and Group Authenticators are allowed to remove subgroups.  | 
 Yes, No Default: No  | 
| 
 Remove Users  | 
 Specify whether Enterprise and Group Authenticators are allowed to remove users.  | 
 Yes, No Default: No  | 
| 
 Remove Users from Enterprise  | 
 Specify whether Authenticators are allowed to remove users from the enterprise.  | 
 Yes, No Default: No  | 
		