Plan and configure authorization

After a user has been authenticated, he or she can then be validated when attempting to
interact with resources in a web application; this validation process is called authorization.
This objective covers how to: