Configuring user authorizations You must configure authorizations for users, such as specifying security groups and specifying security profiles.