Difference between revisions of "Authorization"

From MgmtWiki
Jump to: navigation, search
(Context)
(Context)
Line 3: Line 3:
  
 
==Context==
 
==Context==
* Previously [[Authorization]] was considered to be the second step after the user had been [[Authentication]]
+
* Previously [[Authorization]] was considered to be the second step after the user had been [[Authentication|Authenticated]].
 
* The challenge of [[Authorization]] can be modeled as a decision theory where [[Authorization]] of access is granted after the [[Authorization]] service has evaluated the [[Claim]]s presented and made a single decision about access where the [[Identity]] of the [[Subject]] is assumed to haven been appropriately [[Authentication]]. In the case of a failed [[Authorization]] the [[Subject]] was typically given instructions on the appropriated manual procedures to be follow to gain access to the resource.
 
* The challenge of [[Authorization]] can be modeled as a decision theory where [[Authorization]] of access is granted after the [[Authorization]] service has evaluated the [[Claim]]s presented and made a single decision about access where the [[Identity]] of the [[Subject]] is assumed to haven been appropriately [[Authentication]]. In the case of a failed [[Authorization]] the [[Subject]] was typically given instructions on the appropriated manual procedures to be follow to gain access to the resource.
 
*In the long term game theory would be a better model
 
*In the long term game theory would be a better model

Revision as of 12:29, 30 December 2018

Full Title or Meme

An action that will give a user an Access Token to a protected resource.

Context

  • Previously Authorization was considered to be the second step after the user had been Authenticated.
  • The challenge of Authorization can be modeled as a decision theory where Authorization of access is granted after the Authorization service has evaluated the Claims presented and made a single decision about access where the Identity of the Subject is assumed to haven been appropriately Authentication. In the case of a failed Authorization the Subject was typically given instructions on the appropriated manual procedures to be follow to gain access to the resource.
  • In the long term game theory would be a better model

Bayesian Identity Proofing provides the means for a collection of authentication and verification steps to be validated.

Problems

Solutions

References