# AuthorizationThe advanced authorization capabilities within Spring Security represent one of the most compelling reasons for its popularity.Irrespective of how you choose to authenticate - whether using a Spring Security-provided mechanism and provider, or integrating with a container or other non-Spring Security authentication authority - you will find the authorization services can be used within your application in a consistent and simple way.In this part we’ll explore the different `AbstractSecurityInterceptor` implementations, which were introduced in Part I.We then move on to explore how to fine-tune authorization through use of domain access control lists.## Section Summary*[Authorization Architecture](architecture.html)*[Authorize HTTP Requests](authorize-http-requests.html)*[Authorize HTTP Requests with FilterSecurityInterceptor](authorize-requests.html)*[Expression-Based Access Control](expression-based.html)*[Secure Object Implementations](secure-objects.html)*[Method Security](method-security.html)*[Domain Object Security ACLs](acls.html)[Authentication Events](../authentication/events.html)[Authorization Architecture](architecture.html)