. . . . "Doing so will enforce the rule that, in subsequent logons by the user, the role will not be enabled except by applications using the authorized package." .