This document lists employee and manager roles for access to various applications and systems. It includes names of employees and their access levels to test policies, add or update roles, monitor applications, view network user lists, and manage active directory and application access rules. It also describes a two step approval process for registration requests and roles that requires approvers from IS Security, Audit, Compliance or those designated as administrators.