Skip to main content

Questions tagged [authorization]

Authorization is the process of determining whether a user, program or device is allowed to access a protected resource in a particular way. Not to be confused with authentication.

2 votes
1 answer
368 views

When implementing an authorization system like RBAC/DAC, or XACML, or the AWS IAM authorization model, I see that I can't totally decouple business logic from authorization when there are fine-grained ...
3 votes
2 answers
442 views

We have a database table of encrypted log entries, each encrypted entry containing information about the user who created the entry. The entry is encrypted with the encryption key of the particular ...
0 votes
2 answers
375 views

I have seen some similar questions a few years old and I am not sure if there are any new changing views on this. I see that this flow is not recommended for mobile native apps. What are the practical ...
3 votes
1 answer
1k views

I have a scenario where I need to implement OAuth 2.0 authorization code flow on the server side - the user authorizes a backend service against Microsoft, the service receives a token, saves it in a ...
0 votes
1 answer
322 views

We got a bunch of different services (SPAs + API GW, legacy JavaEE apps, etc.). Each of those is usually ran in multiple instances (customer specific instances). The plan is to federate them under a ...
2 votes
1 answer
787 views

After a lot of research about authentication and authorization, I reached the following but not sure if what I reached is the correct thing so please help me out: Authentication is who you are. ...
0 votes
1 answer
1k views

As the title suggests, I would like to expose a couple of read-only endpoints without requiring a key or token. The endpoints will allow the user to request their data for the purposes of displaying ...
2 votes
1 answer
3k views

in our organization we have our own OpenId server (Identity Server) that we use to authenticate people into our applications, let me explain how we currently handle our web clients. so we have an API ...
1 vote
4 answers
3k views

I am creating an app. Users need to both login and sign-up. I want to simplify the form for this process as much as possible. This got me thinking. Instead of doing the traditional email, confirm ...
0 votes
1 answer
98 views

I'm trying to understand the Authorisation Code flow in OAuth and I'm confused about how CSRF would happen, specifically I don't think I'm understand how the flow actually works. Here's a diagram of ...
0 votes
1 answer
176 views

(Security non-expert here) Use case: You have Simple single page web app, where users can download files. The page uses JWT tokens for authorization. Only certain users should be able to access ...
1 vote
0 answers
96 views

A recurring problem when implementing authorisation checks using procedural code is that you end up duplicating a lot of checks across your codebase and it is easy to forget to apply a check, or ...
3 votes
2 answers
817 views

Quick Context: I often come across videos where people build apps using SQL database services alongside serverless functions (like AWS Lambda, Vercel, and others) without setting up a VPC to keep the ...
5 votes
2 answers
2k views

There are database services offering access to the database via a HTTPS API, such as Neon and Algolia. This is great for serverless environments, but from a security standpoint, I’m curious if this ...
4 votes
3 answers
2k views

I have a question about implementing OpenID Connect. I understand the different flows and get that the authorization code flow is good because client credentials and server-to-server communication is ...

15 30 50 per page
1
2 3 4 5
32