Make use of user groupings to determine authorization (for example, via groups in ActiveDirectory or LDAP or by using AuthZProxy or Grouper).See also: Level 2, Level 3, Level 4, SA6, Servers A