* Extract authorization from access policy commands * Use auto mapper to ignore unwanted properties ---------