In this chapter, we will define authentication and authorization. We will review different approaches for implementing both in our serverless application, discuss where those approaches might apply, and provide some security practices for each. Lastly, we will review services and capabilities that AWS, Azure, and Google Cloud provide to help us implement authentication and authorization.
Authentication and Authorization
Authentication and authorization are similar yet different. Authentication (AuthN) allows us to verify that the person/machine wanting access is who he/she/it ...