Apply an ARM account to a specific security role or data owner
Background / Value
There are two possibilities of involving data security officers and auditors in security related processes.
- Grant the user read only access to ARM.
- Define which reports are relevant and ARM will send them to the user automatically in the desired frequency.