Authorization

Authorization ensures rights are associated with resources. When either a user, software or hardware requests a resource, authorization deals with defining the policy deciding whether access to that resource is allowed or not. Rights associated with each resource are called an Access Policy. A resource can be any of the following:

  • Files;
  • Any form of Data;
  • Programs and parts of programs;
  • Devices.

Not to be confused with Authentication. On the one hand, Authentication deals with identity, ensuring the subject (user or program) are who they claim to be. On the other hand, Authorization subsequently enforces the access policy associated with that same user or program. Those two steps together are part of Access Control, verifying consumers first and then authorizing. This control is often defined by a system administrator, and can be role-based in most modern systems. A common basis in authorization is the principle of least privilege: a consumer must only have access to what is necessary for the fulfillment of their task.

Related articles

Connecting to ADLS Gen2 from Hadoop (HDP) and Nifi (HDF)

Connecting to ADLS Gen2 from Hadoop (HDP) and Nifi (HDF)

Categories: Big Data, Cloud Computing, Data Engineering | Tags: NiFi, Hadoop, HDFS, Authentication, Authorization, Azure, Azure Data Lake Storage (ADLS), OAuth2

As data projects built in the Cloud are becoming more and more frequent, a common use case is to interact with Cloud storage from an existing on premise Big Data platform. Microsoft Azure recentlyā€¦

Gauthier LEONARD

By Gauthier LEONARD

Nov 5, 2020

Policy enforcing with Open Policy Agent

Policy enforcing with Open Policy Agent

Categories: Cyber Security, Data Governance | Tags: Kafka, Ranger, Authorization, Cloud, Kubernetes, REST, SSL/TLS

Open Policy Agent is an open-source multi-purpose policy engine. Its main goal is to unify policy enforcement across the cloud native stack. The project was created by Styra and it is currentlyā€¦

Leo SCHOUKROUN

By Leo SCHOUKROUN

Jan 22, 2020

Users and RBAC authorizations in Kubernetes

Users and RBAC authorizations in Kubernetes

Categories: Containers Orchestration, Data Governance | Tags: Cyber Security, RBAC, Authentication, Authorization, Kubernetes, SSL/TLS

Having your Kubernetes cluster up and running is just the start of your journey and you now need to operate. To secure its access, user identities must be declared along with authentication andā€¦

Robert Walid SOARES

By Robert Walid SOARES

Aug 7, 2019

Guide to Keybase encrypted directories

Guide to Keybase encrypted directories

Categories: Cyber Security, Hack | Tags: Cryptography, Encryption, File system, Keybase, PGP, Authorization

This is a guide to using Keybaseā€™s encrypted directories to store and share files. Keybase is a group, file and chat application whoā€™s goal is to bring public key crypto based on PGP to everyone inā€¦

Arthur BUSSER

By Arthur BUSSER

Jun 18, 2018

Canada - Morocco - France

We are a team of Open Source enthusiasts doing consulting in Big Data, Cloud, DevOps, Data Engineering, Data Scienceā€¦

We provide our customers with accurate insights on how to leverage technologies to convert their use cases to projects in production, how to reduce their costs and increase the time to market.

If you enjoy reading our publications and have an interest in what we do, contact us and we will be thrilled to cooperate with you.

Support Ukrain