This figure shows how authorization policies are mapped to resources and enterprise roles or users.