Do you know how to extract the data roles from a POD? Check which security profiles are mapped to data roles. Read on to know more details.
This is a VIP member-only content.
Please sign-up for the VIP Membership to get access to this content.
If you have already signed up, please Login to access the content.