Authorization mechanisms protect functionalities from being executed by unauthorized entities.Authorization can avoid the exploitation of Telecommands, API, CLI or other command methods to modify system configuration. Backdoor installation, data manipulation, and the use of Payload and Spacecraft’s resource are limited if authorization is applied. [1]