Who should ask and who should confirm

The person requesting an access change should be identifiable, and the church-side approver should be clear when the change affects real permissions or sensitive records.

Do not treat informal hallway approval or vague team memory as enough for consequence-heavy access changes.

What support should not guess

Support-facing surfaces should not guess whether a requester is authorized to add, remove, or broaden access for someone else.

When identity, authority, or scope feels unclear, narrower verification and escalation should win over speed.