Authorization
Authorization ensures rights are associated with resources. When either a user, software or hardware requests a resource, authorization deals with defining the policy deciding whether access to that resource is allowed or not. Rights associated with each resource are called an Access Policy. A resource can be any of the following:
- Files;
- Any form of Data;
- Programs and parts of programs;
- Devices.
Not to be confused with Authentication. On the one hand, Authentication deals with identity, ensuring the subject (user or program) are who they claim to be. On the other hand, Authorization subsequently enforces the access policy associated with that same user or program. Those two steps together are part of Access Control, verifying consumers first and then authorizing. This control is often defined by a system administrator, and can be role-based in most modern systems. A common basis in authorization is the principle of least privilege: a consumer must only have access to what is necessary for the fulfillment of their task.
Related articles
Connecting to ADLS Gen2 from Hadoop (HDP) and Nifi (HDF)
Categories: Big Data, Cloud Computing, Data Engineering | Tags: NiFi, Hadoop, HDFS, Authentication, Authorization, Azure, Azure Data Lake Storage (ADLS), OAuth2
As data projects built in the Cloud are becoming more and more frequent, a common use case is to interact with Cloud storage from an existing on premise Big Data platform. Microsoft Azure recentlyā¦
Nov 5, 2020
Policy enforcing with Open Policy Agent
Categories: Cyber Security, Data Governance | Tags: Kafka, Ranger, Authorization, Cloud, Kubernetes, REST, SSL/TLS
Open Policy Agent is an open-source multi-purpose policy engine. Its main goal is to unify policy enforcement across the cloud native stack. The project was created by Styra and it is currentlyā¦
Jan 22, 2020
Users and RBAC authorizations in Kubernetes
Categories: Containers Orchestration, Data Governance | Tags: Cyber Security, RBAC, Authentication, Authorization, Kubernetes, SSL/TLS
Having your Kubernetes cluster up and running is just the start of your journey and you now need to operate. To secure its access, user identities must be declared along with authentication andā¦
Aug 7, 2019
Guide to Keybase encrypted directories
Categories: Cyber Security, Hack | Tags: Cryptography, Encryption, File system, Keybase, PGP, Authorization
This is a guide to using Keybaseās encrypted directories to store and share files. Keybase is a group, file and chat application whoās goal is to bring public key crypto based on PGP to everyone inā¦
Jun 18, 2018