...
The role and authorizations that are defined in the generated file can be used by JEAF Security to ensure security at runtime.
...
For further information please also refer to:
https://bitbucket.org/anaptecs/jeaf-generator-samples/src/master/accounting-services-impl-runtime/src-gen/main/resources/AuthorizationData.xml