Chapter 3. Managing confined and unconfined users