JMS System Module: Security Roles
Column Display Related Tasks Related Topics
This page summarizes the security roles that can be used only in the policy for this JMS system module.
You can show fewer or additional data points on this page by expanding Customize this table and modifying the Column Display list. Each data point displays in its own table column.
The following table lists all of the data points that you can display in columns on this page.
Name Description Name
The name of the scoped role.
The role mapper provider that is responsible for managing this role definition.