9.3 Authorization

After an identity is suitably authenticated, authorization provides access to resources. The Authorization Protocols Overview [MS-AZOD] describes the authorization protocols used by Windows. The authorization protocols are listed in [MS-AZOD] section 2.2.