
What features should an ideal authorization model have?

Common Approaches to Authorization & how they stack up against our ideal wishlist

Why and how a Model Level Authorization system makes sense

Hasura authorization model demo

Advanced authorization techniques