Defining and Managing Identity and Authority
Before we get into things, let me start by saying that this isn’t going to be about authorization or any of the many, many mechanisms for authenticating a user and authorizing that user to access your system. While those mechanisms…