This is the authorization layer. What data are users authorized to access, download, forward, copy, export, change, add, update, preview, edit, print, upload, share, delete, create, and so on? What entitlements or settings can users modify? What groups and distribution lists can they join, view, edit, delete, or share? That’s where the concept of user interactions come in.

