Role, security constraint: best practice ?

Version imprimable