Lists all roles in the database and to whom (user or role) they were granted.  This report is used to walk backwards
along all access paths in the database to their start points (user names).  Used when researching the levels of
security indirection in a database.
