• Creating authenticators for the wampire router
  • Using the Authorizer to Intercept Messages