Following on from the previous tutorial; I’m going to lead us through creating an ACL (access control list) for our authenticated application. This tutorial follows on from the previous tutorial in…