When you determined the type of data to collect for applications, you also collected information about users who would be fulfilling the roles in the application analysis process. You must define these users before the analyst can import this application data.
See Table 3-1. APM user type setup for the recommended settings when configuring an APM user.
For information on how to define and create users, see Security Model Guide and Reference.