Mechanisms exist to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities.