In this article, we will learn how to remove Access Control Lists (or ACLs in short) using maps for selecting a backend, based on a request parameter. The advantage of using maps instead of ACLs is that sometimes it might be easier to update the mapping rather than the ACL.
Before starting, we must first understand what ACLs are.