Analyzing users and authorizations