List of Figures List of Figures 1-1 Enterprise User Security and the Oracle Security Architecture 1-2 Example of Enterprise Roles 1-3 Related Entries in a Realm Oracle Context 3-1 Opening Page of Oracle Net Configuration Assistant 4-1 Enterprise User Security Configuration Flow Chart