Authorization controls can be built into the software, and govern not only what system or object a specified user can access, but also what the user may do with it. The process of authorization involves authentication of subjects requesting access to objects, where subject’ represents a user or program and ‘object’ represents a database table, view, procedure, trigger, or any other object that can be created within the system.