Configuring a security role