Data Management (DMS) provides various system roles as described in the following table.
||In addition to all the features that are available for regular users, security administrators can also use the Operation Logs, Sensitive Data, and Data Protection features.|
|Database administrator (DBA)||
||In addition to all the features that are available for regular users, DBAs can also use all the system management features except for the Data Protection and User features.|
|Schema read-only||The schema read-only role is applicable to the staff such as data analysts in enterprises. In DMS, a user who assumes the schema read-only role has permissions to query the metadata of instances, databases, and tables. For example, the user can view the details of a table or export an entire database.||Users who assume the schema read-only role can query the metadata of all instances, databases, and tables, without the need to have query, change, or export permissions on these instances, databases, and tables.|
Note For more information about how to assign system roles to DMS users, see Manage users.