Session 1: Overview and Requirements
In this first session, we will walk through an overview of authorization and look at the different stakeholders that define the requirements for authorization.
- Authentication & Authorization - what's the difference?
- Authorization Overview & Requirements
- Attributes and how to use them for authorization
- Tokens
- Claims & Scopes used to hold attribute values
Related resources
- The Entitlement Management System
- Introducing the Neo-Security Architecture
- Using Curity, OPA and Kong for end-to-end API authentication and authorization
- OAuth Authorization with JWT Authorization Requests
- Scope Authorization Manager
Course Outline
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.