Part four of this series switches the focus from topics related to authentication to topics related to authorization.

This story continues at http://databasejournal.com/features/...le.php/3357861