Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk.
Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions.