Once users have been authenticated, they are authorized database privileges according to their defined privileges.