Description of the illustration ccsec_resource.gif

This figure shows how authorization policies are mapped to resources and enterprise roles or users.