Taking a closer look at messy authorization

Adding to my series on the Ash Framework book.