Configuring user authorizations

You must configure authorizations for users, such as specifying security groups and specifying security profiles.