Let me explain to you the whole concept in layman terms.

The whole concept of access control can be visualized as 3 gates before you reach the treasure box.

Like you have to cross all the gates to reach the treasure, the same way you have to cross paths with 3 levels of configuration to actually achieve successful access control on data. You can consider the 3 gates as metadata access to achieve access on actual data. The twist is that all the gates are required to be crossed sequentially as they reside in each other.

Without crossing the outermost gate, you can’t reach the middle one and without crossing middle, you can’t reach the innermost. Even if you manage to reach innermost without crossing the outer ones, it’s a fail as you can’t get the treasure without every other gate being opened.

Let’s get started with the first gate, please move to next blog of the series to cross it.