Model any access control scheme from RBAC to fine-grained access control or create a custom scheme that fits your application.