Software Architecture and Decision-Making by Srinath Perera;
Author:Srinath Perera;
Language: eng
Format: epub
Publisher: Pearson Education (US)
Published: 2024-02-15T00:00:00+00:00
Letâs look first at attribute-based authorization, where authorization is defined as rules based on the userâs attributes. For example, a bankâs rule may say that a user can create a regular account only if the user is older than 18 years. Often, an IDP provides tokens that assert the attributes, and the applications use the tokens to authorize. How to support a what-are-my-resources query is not clear in this instance.
Furthermore, it is possible to use a fully token-based approach, where we issue users tokens explaining what they can do, and the users send them back when they want to interact with the system. The primary advantage of this model is that itâs decentralized; tokens issued by trusted IDPs can give rise to a rich security landscape. However, a token-based approach poses several challenges.
In this approach, the user needs to store and manage those tokens, which is harder from the userâs perspective. The user might inadvertently (or maliciously) give those tokens to outsiders. Revoking permissions is also complicated. Finally, supporting a what-are-my-resources query is difficult.
These complex authorization models are implemented using XACML (Extensible Access Control Markup Language) or Open Policy Agent (OPA), but you should seek help from a security architect if adapting these models. Next, letâs focus on where to place the authorization logic.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8258)
Test-Driven Development with Java by Alan Mellor(6386)
Data Augmentation with Python by Duc Haba(6285)
Principles of Data Fabric by Sonia Mezzetta(6062)
Hadoop in Practice by Alex Holmes(5938)
Learn Blender Simulations the Right Way by Stephen Pearson(5922)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(5810)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5783)
RPA Solution Architect's Handbook by Sachin Sahgal(5207)
Big Data Analysis with Python by Ivan Marin(5175)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5102)
The Infinite Retina by Robert Scoble Irena Cronin(4896)
Pretrain Vision and Large Language Models in Python by Emily Webber(4153)
Functional Programming in JavaScript by Mantyla Dan(4018)
The Age of Surveillance Capitalism by Shoshana Zuboff(3914)
Infrastructure as Code for Beginners by Russ McKendrick(3910)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3614)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3425)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3400)
