YoVDO

Why Authorization is Hard

Offered By: PyCon US via YouTube

Tags

PyCon US Courses Python Courses Application Development Courses Authorization Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the complexities of implementing authorization in software applications through this insightful PyCon US talk. Delve into the three key building blocks of authorization: enforcement, decision architecture, and modeling. Discover why these components present unique challenges, especially within the Python ecosystem. Learn about the difficulties of enforcing authorization across various application layers, the complexities of separating authorization logic from application data, and the challenges of creating scalable authorization models. Gain valuable insights into different approaches for solving these issues, along with their associated trade-offs. Equip yourself with the knowledge to make informed decisions when implementing authorization in your own projects.

Syllabus

Introduction
What is Authorization
Why Authorization is Important
Modeling Authorization
Enforcement
In a nutshell
Architecture
Centralized Logic
Decentralized Data
Centralize Data
Resources


Taught by

PyCon US

Related Courses

Authentication & Authorization: OAuth
Udacity
Rails with Active Record and Action Pack
Johns Hopkins University via Coursera
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Managing Identity
Microsoft via edX