Technical Blog Post
Configuring Application Server Security with Decision Optimization Server
When deployed into the enterprise as a production system, it replaces the default file-based configuration. In this case, the roles mapping to the EAR modules must be matched in the new security definition. Below are screenshots for each application showing the mappings.