• A Assign users to role
  • B Security configuration
  • C External roles
  • D Dormant user security accounts