04 Auth
4.6 Summary
In this section, we took the TokenSale example we created in Chapter 3.7: Building a Token Sale and evolved it by adding permissioned methods and configuring auth for those methods. Configuring auth for your component has similar principles with configuring auth for your resources, except we can create our own custom roles. This means we can label any kind of roles that best represent the permissions we intend, attach an
AccessRule to that role, and apply those roles to the methods that we want to allow access for.