Options for building an authorization policy
Optional
Access control lists
Bypass paths (no auth required)
Crypto key configuration for JWT validation
Policy name (referenced by gatekeeper_name in handlers)
Options for building an authorization policy