How to Use This Guide

You can review the information in this guide to decide how to assign roles and privileges to specific users. For each role, you will find these details:

  • The role hierarchy that lists the other inherited roles
  • A list of duties assigned to that role
  • Privileges granted to that role
  • Data security policies and their implementation scope
Note: The changes you make to the security reference implementation are preserved during upgrades or maintenance patches.