Ask HN: How to implement ABAC authorization for enterprise applications? | Dark Hacker News