Lists roles in the database and to whom (user or role) they were granted.  
This used to walk backwards along database access paths to start points 
(user names).  Researches the levels of security indirection in a database.
