Apply an ARM account to a specific security role or data owner

Background / Value

There are two possibilities of involving data security officers and auditors in security related processes.

  • Grant the user read only access to ARM.
  • Define which reports are relevant and ARM will send them to the user automatically in the desired frequency.