This section describes how to set up users and assign roles based on the operations they are permitted to perform within AMS.