This document discusses access control patterns and practices using WSO2 middleware. It provides an overview of the speaker's background and experience. It then covers topics such as discretionary vs mandatory access control, authorization tables vs access control lists vs capabilities, XACML as the standard for policy-based access control, and examples of implementing access control in WSO2 products using XACML, SAML, and other technologies.