Authentication and Authorization
Before we can get anywhere in this chapter or the next, we must first come to grips with the questions of authentication and authorization. The central issue in both cases is that security must be able to ensure that only authenticated entities are permitted to carry out authorized actions. This issue therefore is resolved into two distinct questions:
Authentication: Who are you?
Authorization: Are you permitted?
Who are you? [3] can refer to either the identity of the user currently executing the code or the identity of the assemblies[4] that contain the code being executed. In fact, this distinction is the key difference between user-based security and CAS. In the case of user-based security, the question of ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access