Implementing authorization

Last updated