Authorization: The process of determining what permissions an authenticated user has access to. It’s the step that follows authentication – once the system confirms the user’s identity, it then determines what resources, data, or areas the user can access or manipulate based on predefined policies or rules.
Categories: CC D3: Access Controls Concepts | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D5: Identity and Access Management (IAM) | Security+ D1: General Security Concepts | SSCP D2: Access Controls
Related Articles:
- Glossary: TACACS+ (Terminal Access Controller Access-Control System Plus)
- Glossary: Tampering
- Glossary: Session Layer
- Glossary: Screen scraping
- Glossary: Security Assertion Markup Language (SAML)
- Glossary: Rogue wireless access point
- Glossary: SAML (Security Assertion Markup Language)
- Glossary: RFC 8907
- Glossary: Remote Authentication Dial-In User Service (RADIUS)
- Glossary: Piggyback attack