How to use ESHA Security

NOTE: for any users who will be utilizing and configuring permissions within ESHA Security, the minimum Roles required to add new users and assign them to roles is membership the the following 3 roles:

  • Server Role 'securityadmin'
  • Database Role 'db_accessadmin'
  • Database Role 'db_securityadmin'


ESHA Security consists of the following functions, each of which are performed using a page in the Access Control Utility:

  1. Working with Users
  2. Working with Roles
  3. Working with Security Groups
  4. Configuring Settings
  5. Testing User Access
  6. Exiting ESHA Security