Currenlty a user without any roles assigned in Command Protection are able to access all the commands without any restrictions. Hence by implementation of this enhancement one of the below two needs to be implemented incase when a Command Protecti...