• A User role assignments
  • B Role to user assignments
  • C Security role effective access
  • D Security duty assignments