Authentication is not always simple. And when you mix in sharding you end up with… presentation.

You can find presentation slides here: Authorization strategies