Closed matthieubosquet closed 3 years ago
A simple description of how effective access control resources are discovered.
That mechanism will hold for all Use Case, so in order to avoid unnecessary repetition, it is here factored out.
A simple description of how effective access control resources are discovered.
That mechanism will hold for all Use Case, so in order to avoid unnecessary repetition, it is here factored out.