Navigating and Adding Users to Security Roles: A Step-By-Step Process