Configuring role-based security with composer command-line
This section explains how to create or modify the security objects in the database, by using the composer command line interface.
To define security objects in the database, see:
Access control list definition
To manage security objects in the database, see: Managing objects in the database - composer.
To define or modify security objects, you must have permission for the modify action on the object type file with attribute name=security.