Security object definition

You can use composer command line program to define security objects in the database.
Access control lists
Each access control list assigns security roles to users or groups, in a certain security domain.
Security domains
Each domain represents the set of scheduling objects that users or groups can manage.
Security roles
Each role represents a certain level of authorization that defines the set of actions that users or groups can perform on a set of object types.