A method for integrated security roles is presented. An upstream
application includes one or more role-mapping requirements that
correspond to an upstream security role and a downstream security role.
The upstream security role is expanded by adding an upstream security
role identifier in a downstream application's role-mapping table or by
adding upstream user-to-role mappings to a downstream application's
role-mapping table. When an upstream security role is expanded, a user
assigned to the upstream security role automatically has access to
role-mapped downstream applications.