Configuring role-based security with composer command-line
About this task
This section explains how to create or modify the security objects in the database, by using the composer command line interface.
To define security objects in the database, see:
Access control list definition
To manage security objects in the database, see: Managing objects in the database - composer.
To define or modify security objects, you must have permission for the modify action on the object type file with attribute name=security.