osch Sicherheitssysteme GmbH was able to take advantage of the Xiting Role Designer, newly integrated into the XAMS, to capture the processes used and generate suggested roles from these processes. These purely virtual roles were then verified and modified with an eye to the final user mapping (degree of coverage). In making these modifications,