{"id":346,"date":"2014-05-06T20:10:13","date_gmt":"2014-05-06T20:10:13","guid":{"rendered":"http:\/\/www.soportegds.com.ar\/blog\/?p=346"},"modified":"2014-05-06T20:10:13","modified_gmt":"2014-05-06T20:10:13","slug":"como-configurar-los-usuarios-del-sistema","status":"publish","type":"post","link":"https:\/\/gdssistemas.com.ar\/blog\/como-configurar-los-usuarios-del-sistema\/","title":{"rendered":"C\u00f3mo configurar los usuarios del sistema"},"content":{"rendered":"<p>Aprender a configurar los usuarios del sistema es fundamental para proteger nuestros datos y aumentar el control sobre quienes utilizan el sistema y a que funciones pueden acceder.<\/p>\n<p><a href=\"https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/tips_maxikiosco_habilitar_usuarios.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-347\" src=\"https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/como-configurar-los-usuarios-del-sistema.png\" alt=\"como configurar los usuarios del sistema\" width=\"666\" height=\"476\" srcset=\"https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/como-configurar-los-usuarios-del-sistema.png 666w, https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/como-configurar-los-usuarios-del-sistema-300x214.png 300w, https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/como-configurar-los-usuarios-del-sistema-420x300.png 420w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/a><\/p>\n<p>ver en linea\u00a0<a href=\"https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/tips_maxikiosco_habilitar_usuarios.pdf\">tips_maxikiosco_habilitar_usuarios<\/a><\/p>\n<p>descargar el pdf\u00a0<a href=\"https:\/\/gdssistemas.com.ar\/blog\/wp-content\/uploads\/2014\/05\/tips_maxikiosco_habilitar_usuarios.pdf\" download=\"\">tips_maxikiosco_habilitar_usuarios<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aprender a configurar los usuarios del sistema es fundamental para proteger nuestros datos y aumentar el control sobre quienes utilizan el sistema y a que funciones pueden acceder. ver en linea\u00a0tips_maxikiosco_habilitar_usuarios descargar el pdf\u00a0tips_maxikiosco_habilitar_usuarios &nbsp; &nbsp;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,4,18,19,23,24,28],"tags":[178],"class_list":["post-346","post","type-post","status-publish","format-standard","hentry","category-boutique-basico","category-capacitacion","category-maxikiosco-2","category-mercadito","category-pdf","category-preguntas-y-respuestas","category-seguridad-2","tag-usuarios"],"_links":{"self":[{"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/posts\/346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":0,"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/posts\/346\/revisions"}],"wp:attachment":[{"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/media?parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/categories?post=346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gdssistemas.com.ar\/blog\/wp-json\/wp\/v2\/tags?post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}