Description of the illustration ccsec_resource.gif
This figure shows how authorization policies are mapped to resources and enterprise roles or users.