Moving authorizations across stages is a key issue for an Identity Vault security model. eDirectory authorizations are assigned to individual objects or to a collection of objects. These authorizations play an important role in the object security because they determine the permission to access the object to which they have been assigned.
eDirectory authorizations can be performed through Access Control Lists (ACLs) or Security Equivalences/Exclude Roles. Drivers, jobs, RBEs, and so on should have enough permissions to successfully perform the desired operations. See Preparing for Staging for more information.