Session 1: Overview and Requirements

In this first session, we will walk through an overview of authorization and look at the different stakeholders that define the requirements for authorization.

  • Authentication & Authorization - what's the difference?
  • Authorization Overview & Requirements
  • Attributes and how to use them for authorization
  • Tokens
  • Claims & Scopes used to hold attribute values

Related resources


Course Outline

Next steps

Ready to modernize IAM?

Start Today - Build security and improve ease of use to stay ahead of the competition.