December 2019
Intermediate to advanced
323 pages
7h 31m
English
A people that values its privileges above its principles soon loses both.
—Dwight D. Eisenhower, 34th president of the United States, from first inaugural address
The previous chapters covered the mechanics of authorizing an API call and authenticating a user. This chapter will discuss authorization vs. the enforcement of access policy and how identity protocols can be used to help implement them.
In governing what a user or application can ...