Use this report to determine the users that have authorizations or critical combinations of authorizations.