Factors to Weigh When Building Authorization Architecture | Dark Hacker News