Architecting Application Authorisation
In the modern digital landscape, application authorisation has evolved from a simple gatekeeper to a complex, nuanced system crucial for security, user experience, and compliance. Gone are the days of basic "yes/no" access controls; today's applications demand granular permissions, delegated authority, and seamless integration across diverse platforms. Architecting application authorisation effectively requires a deep understanding of authentication flows, permission models like RBAC and ABAC, and technologies like OAuth 2.0 and OpenID Connect. This guide dives into the critical considerations and best practices for building robust, scalable, and user-friendly authorisation architectures, empowering you to secure your applications without compromising usability or innovation.
OPA
- https://www.openpolicyagent.org/docs/latest/
- https://sangkeon.github.io/opaguide/
- https://github.com/StyraInc/awesome-opa
- https://docs.styra.com/apps/advanced-architecture
Microservices
- https://www.manning.com/books/microservices-security-in-action
- https://cheatsheetseries.owasp.org/cheatsheets/Microservices_Security_Cheat_Sheet.html
UI
- https://docs.aws.amazon.com/prescriptive-guidance/latest/saas-multitenant-api-access-authorization/opa-ui-filtering-examples.html
- https://pongzt.com/post/opa-ui/
Within browser
What is ABAC
Examples:
- https://github.com/StyraInc/entitlements-samples
- https://developer.gs.com/blog/posts/using-entitlements-for-privileged-access-to-apis-and-applications-in-a-cloud-environment
- https://developer.gs.com/blog/posts/scaling-opa-for-oces
Comments