Illustrates declarative role-based security