• What did you say your name was again?
  • Securing your resources
  • Creating your own security extensions
  • Implementing your own authentication provider