Identity and Access Context
Most enterprise applications today need to have some form of security and permissions components in place to ensure that people who try to use the system are authentic users and are authorized to do what they attempt to do. As we just analyzed, a naive approach to application security builds users and permissions in with each discrete system, which creates a silo effect in every application.
LB: “You have no locks on your barns and silos, but nobody steals your corn?”
AJ: “My dog Tumbleweed cares for access management. It’s my own silo effect.”
LB: “I don’t think you really understand the book.”
The users ...