You are currently reviewing an older revision of this page.
The below figures show the steps to grant system level access to the user.