A comparison of different approaches to implement authorization - those coupled with the database and those decoupled.| zenstack.dev