Configuring role-based security with composer command-line

This section explains how to create or modify the security objects in the database, by using the composer command line interface.

To define security objects in the database, see:

Access control list definition

Security domain definition

Security role definition

To manage security objects in the database, see: Managing objects in the database - composer.

To define or modify security objects, you must have permission for the modify action on the object type file with attribute name=security.