What statement describes the authorization component of a AAA implementation?

A.
Verifying that a user is who he says he is
B.
Validating client device credentials against a database
C.
Logging the details of user network behavior in order to review it at a later time
D.
Granting access to specific network services according to a user profile
E.
Implementing a WIPS as a full-time monitoring solution to enforce policies