The Steps Required to Configure Authorization