Access control

Creating a policy
Instructions on how to create a policy to protect an application
Restricting scope granters
Instructions for restricting who can assign a scope
Restricting scope requestors
Instructions for restricting who can request a scope
Verifying a policy
Instructions on how to test your policy in a sample application