Skip to main content

Questions tagged [authorization]

1 vote
1 answer
215 views

I am working on an identity and users service in a microservices system for which a passwordless, SMS-based authentication is a hard requirement, i.e. User enters their phone number System sends the ...
dzenesiz's user avatar
  • 227
3 votes
1 answer
702 views

I’m trying to clarify the difference between Role-based Access Control, Policy-based Access Control, and Access Control List when designing an authorization system. I have two scenarios: Scenario A I ...
Meitaiyang's user avatar
4 votes
3 answers
228 views

We are designing a backend system for a large platform where users can interact with multiple products on behalf of different companies. We plan to use Keycloak as an external identity provider. The ...
ikiwq's user avatar
  • 165
2 votes
3 answers
426 views

Recently, I’ve found myself designing a microservices system, and I’m currently facing some challenges with authentication and authorization. Context All my microservices will be placed behind an API ...
ikiwq's user avatar
  • 165
3 votes
2 answers
327 views

So I just fell in a project where microservices are inside private subnets and therefore aren't reacheable through the internet. There is a balancer that can reach this microservices and this balancer ...
Matheus's user avatar
  • 219
4 votes
1 answer
180 views

I plan to have a frontend web app written with Next.js using the AuthJS library to provide user authentication using Oauth. This frontend application depends on a backend API. I want to make sure my ...
Romuloux's user avatar
  • 149
0 votes
2 answers
185 views

Let's say a user is authenticated to a website and can access a given page only if authorized to access it specifically, e.g. if the website has only these 2 pages https://my-classified-docs.com/page=...
Francesco B.'s user avatar
0 votes
1 answer
294 views

I need to design a system that handles multiple types of resources, each having their own business logic and different types of actions available for those resources. The requirements are a natural ...
Nikola Dragić's user avatar
0 votes
1 answer
171 views

Context: I have an API (using DDD) with an entity lets call it "Content" that only can be update by certain users. For example Content with Id = 1, can only be modified by User Id = 1, ...
Danielbahe's user avatar
0 votes
0 answers
119 views

I'm designing a web application and using Microsoft's out of the box Identity and its default Two-Factor Authentication (with Asp.net core MVC and .NET 8). While setting up and testing the 2FA ...
eaglei22's user avatar
  • 147
1 vote
2 answers
227 views

Hi I have following structure : Client App (layer 1) Business logic Services ( Layer 2) Business Logic layer consists of many microservices . Access token can be created and passed from APP layer to ...
TechNjBat's user avatar
4 votes
1 answer
958 views

When creating a web application that will allow users to upload images and mark them as private, should those images be protected by authentication and authorization mechanisms against access by other ...
SunSparc's user avatar
  • 185
0 votes
1 answer
551 views

Let's say we want to return a paginated list of document id that a user can view. In DB, we have: doc_id user_id ABC user_1 def user_1 ... ... We use an external authorization service, so we can query ...
janetsmith's user avatar
1 vote
0 answers
213 views

Currently my company has 2 applications that use Identity Server for SSO. Not every client we have uses both applications but some do. The part I'm uneasy about is that both apps have a user ...
Brad Firesheets's user avatar
0 votes
2 answers
426 views

I’ll try my best to explain, but for the closest context I could think of, imagine that I am building an analytics platform that allows paying users to sign up, place a tracking script on their ...
user8758206's user avatar

15 30 50 per page
1
2 3 4 5
13