Similar to the previous recipes, a System Customizer or higher security role is required to perform the configuration as well as a solution to contain the changes.