Limitations & Restrictions to Role-based Access

You can still access network endpoints directly, such as MFDS and ESMAC directly and this feature does not add security directly to those endpoints if they are exposed.

Micro Focus recommends that you:

A role-based approach can be used with a multiple stacked ESM configuration, however, you will not be able to use the roles user interface features in ESCWA. The resource entities’ ACL strings will have to be set through other tooling. See Manually Modifying a Role Task ACL String for more information.