Figure 4-18 shows the local database users that are available to use as proxy targets for the enterprise users.