This section describes in detail how to configure the security model. Example extensions used in training and certification are also described. These tasks are described in terms of small workflows using the most common options. Where there are many alternatives at any particular point, the alternatives are discussed at the end of the workflow instead of inside the workflow.