Why Authorization is Hard
Offered By: PyCon US via YouTube
Course Description
Overview
Explore the complexities of implementing authorization in software applications through this insightful PyCon US talk. Delve into the three key building blocks of authorization: enforcement, decision architecture, and modeling. Discover why these components present unique challenges, especially within the Python ecosystem. Learn about the difficulties of enforcing authorization across various application layers, the complexities of separating authorization logic from application data, and the challenges of creating scalable authorization models. Gain valuable insights into different approaches for solving these issues, along with their associated trade-offs. Equip yourself with the knowledge to make informed decisions when implementing authorization in your own projects.
Syllabus
Introduction
What is Authorization
Why Authorization is Important
Modeling Authorization
Enforcement
In a nutshell
Architecture
Centralized Logic
Decentralized Data
Centralize Data
Resources
Taught by
PyCon US
Related Courses
Authentication & Authorization: OAuthUdacity Rails with Active Record and Action Pack
Johns Hopkins University via Coursera Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Managing Identity
Microsoft via edX