User authorization requirements

Before beginning the uninstallation procedure, check the authorization roles described in User authorization requirements.