Configuring method lists for authorization