This example uses SSL encryption, NATIVE authentication, and both coarse-grained and fine-grained authorization.