Implementing Authorization
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a comprehensive talk on implementing authorization in software systems. Delve into the challenges of controlling "who can do what" in applications, moving beyond identity and authentication standards like SAML, OIDC, and SPIFFE. Learn why hardcoding authorization logic against authentication attributes can lead to difficult-to-maintain systems. Discover how to leverage the Open Policy Agent, used by companies like Netflix and Chef, to build powerful and flexible authorization systems. Understand the benefits of decoupling authorization from authentication, resulting in more manageable and fine-grained control over applications. The presentation covers introduction, heavy lifting in authorization, differences between authentication and authorization, OAuth, app authorization, common approaches, tradeoffs, and includes a demo showcasing various use cases.
Syllabus
Introduction
Heavy lifting
Authorization
Authentication vs Authorization
OAuth
App Authorization
Common Approaches
Tradeoffs
Demo
Use Cases
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Authentication & Authorization: OAuthUdacity Rails with Active Record and Action Pack
Johns Hopkins University via Coursera Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Managing Identity
Microsoft via edX