Authorization
Authorization
Introduction
For accessing protected resources in web applications or through a physical office,
two terms are used frequently. One is authentication, and the other is authorization.
While you may think these are the same, this is not actually the case. In this
reading, you will learn that they are different and that they play important roles in
the whole access control system.
Authentication versus authorization
Firstly, let’s imagine a scenario where you are trying to enter a building that
requires a keycard to access. Authentication is like swiping your keycard at the
entrance to prove you are a valid cardholder. But authorization is like being granted
access to certain areas of the building based on your job role or clearance level. Just
because you have a keycard and are authenticated to enter the building doesn't
mean you have free access to all areas. Your level of authorization determines
which areas you can access.
So, the main difference between authentication and authorization is that
authentication verifies the identity of a user, while authorization determines what
resources and services they are allowed to access. In other words, authentication is
the process of proving who you are, while authorization is the process of
determining what you are allowed to do.
Authentication is typically the first step in the access control process, as it ensures
that only authorized users are granted access to the system. Once a user is
authenticated, authorization mechanisms are used to determine what resources
and services those users will be allowed to access.
So, now that you understand authentication and authorization, let's explore the key
differences between them.
Authentication Authorization
Verifies the identity of a user, device, or system Determines what actions a user can perform
Access User's role User's attributes User's clearance User's ownership User-define
request level and object's and access rights rules
based on security level
Conclusion
In conclusion, both authentication and authorization are now vital to organizations
around the world. They enable organizations to verify employee identities and
authorize what resources and services they are allowed to access. Throughout this
reading, you learned how important authorization is within modern-day computing
and how it helps to maintain data security and privacy.
You also examined the different types of authorization policies such as RBAC, ABAC,
DAC, and MAC, along with their respective strengths and weaknesses. You then
discovered how authorization is granted and monitored within organizations.