Figure 4-19 shows the local database users that were selected for use as proxy targets for the enterprise users.