Authentication and Authorization are two words that sound simple at first, but quickly spiral into complexity once you try to implement them at scale. On the surface, spinning up a basic role-based auth system feels straightforward. There are endless...