All DCN operations require the "SUP DCN User" logical role in the named security configuration (role mapping applies).
An additional login module with authorization, that can assign a physical role, is required. Module stacking authenticates DCN users, and grants them the DCN role. Ordering of modules and control flag settings in the security configuration can vary. For example: