This chapter describes how you design user groups and provideusers with the identification (UICs, identifiers, privileges) theyneed to do their work. As part of the discussion, the chapter showshow to assign proper protection codes and ACLs to objects so thatthe user can work efficiently while, at the same time, system dataand resources are properly protected. The chapter assumes you arefamiliar with the material in Protecting DataChapter 4 and Descriptions of Object ClassesChapter 5.