Security operation removes or changes security configuration in one or more schemas in one database connection. There are four possible options that are selected exclusively.
Remove security configuration option
Applying security configuration from a selected file on disk
Reuse security configuration from file on a disk
Copy security configuration from other schema inside connection