...
Sensitive Sub Resource Access
NOTE: The examples demonstrate how to manage secure access with the adaptors resource but similar situations could apply with other resources.
GET /.../* may not be desireable since it would allow access resources that should be accessed by only the admin. For example:
...