This holds true for a number of situations where approval is required. For me it's particularly helpful when looking for IT/Information Security approval. "What actions/precautions do you recommend I take, so that you will approve this when you are asked to (and we are implementing a secure solution)?"