The Steps Required to Configure Authorization The Steps Required to Configure Authorization An Example Authorization Scenario