Implementations should provide appropriate methods to set their cache
parameters (eg time-to-live) and/or force removal of entities before their
normal expiration.
Determines the ACLs that are effective for a given
Authentication object.
Implementations will vary depending on their ability to interpret the
"recipient" object types contained in
BasicAclEntry instances, and
how those recipient object types correspond to
Authentication-presented principals and granted authorities.
Implementations should not filter the resulting ACL list from lower-order
permissions.