loading...

re: Pushing Left, Like a Boss — Part 5.11 — Authorization (AuthZ) VIEW POST

FULL DISCUSSION
 

There are several different models used within our industry for authorization

In case you've not seen it, From ABAC to ZBAC by Karp et al. is quite accessible and contrasts quite a few.

A variety of access control models have been developed over the years, each designed to address different aspects of the problem. This report will examine the strengths and weaknesses of the various approaches as applied in a cross domain services and as implemented in common SOA frameworks.

code of conduct - report abuse