Step 3

Assign Security Roles and Groups to a Person