Introduction

This chapter covers the rule sets used during authorization and the necessary configurations required by a custom solution.