Structs

All authentication requests are compromised of two elements: a) A message that follows EIP4361 b) A signature of said message

An authorization is issued to a particular address based on the fields included in the AuthRequest message. With the Resources vecotr, the API can have even more granular control over the access control of a particular address. All the fields are populated by a AuthRequest.message, from the fields with the same name.