Configuration should include making decisions based on user needs for connectivity, applications, permissions, and/or privileges.