After an identity is suitably authenticated, authorization
provides access to resources. The Authorization Protocols Overview [MS-AZOD]
describes the authorization protocols used by Windows. The authorization
protocols are listed in [MS-AZOD] section 2.2.