Session 1: Overview and Requirements
In this first session, we will walk through an overview of authorization and look at the different stakeholders that define the requirements for authorization.
- Authentication & Authorization - what's the difference?
- Authorization Overview & Requirements
- Attributes and how to use them for authorization
- Claims & Scopes used to hold attribute values
- The Entitlement Management System
- Introducing the Neo-Security Architecture
- Using Curity, OPA and Kong for end-to-end API authentication and authorization
- OAuth Authorization with JWT Authorization Requests
- Scope Authorization Manager