1. Assign the user to the appropriate security groups.
2. Have the users log into the database.