TASK 5 – ROLE BASED ACCESS

- Users have roles (admin/user)
- Role stored in session after login
- Access restricted per page
- Unauthorized users redirected
- Common real-world auth pattern

Key line:
'I restricted access using role checks and sessions to secure admin resources.'
