Permission management that is user config dependent is fragile if not designed with precision. Each user’s configuration defines the boundaries of access: what they can read, write, delete, and execute. When configs drive permissions, the system must resolve them fast, consistently, and without error. If resolution fails, the wrong