Following our Blog Tutorial example, imagine we wanted to secure the access to certain URLs, based on the logged in user. We also have another requirement, .