Understanding Authorization in IAM: Methods & Best Practices