Section C.1, Access Control Using PAM UserGroup as IDM Entitlements
Section C.2, Access Control Using SSH Relay and RDP Relay Features of PAM