SlideShare a Scribd company logo
AUTHENTICATIO AND
AUTHORIZATION IN
WEB APPLICATIONS
SECURITY
Supervisor: D. Mayada Al Meghari
Abed Elilah Elmahmoum
Course :ITCS6322.20447.31.88-
Web Applications Security
● Introduction
● Concepts
● Authentication vs. Authorization
● Applications examples
● Authentication Methods
● Authorization Methods
● Implementation and scenario
CONTENTS
INTRODUCTION
It seems that there is no way
to go through a day without
using authentication and
authorization in our real-life
and virtual-life.
CONCEPTS
 Is the process of identifying
users that request access to
a system, network, or device.
 Verify who you are?
Authentication
CONCEPTS
 Is the process of controlling
user access via assigned
roles & privileges.
 What you can do?
Authorization
Authentication vs. Authorization
Authentication Authorization
What does it do? Verifies credentials
Grants or denies
permissions
How does it work?
Through passwords,
biometrics,….
Through settings
maintained by
security teams
Is it visible to the
user?
Yes No
It is changeable by
the user?
Partially No
How does data
move?
Through ID tokens
Through access
tokens
Applications Exampels
Applications that use authentication and authorization.
Mobile application:
 Social media apps (Facebook, Twitter, LinkedIn….).
 Google apps (Gmail, Google Play…..).
 Ecommerce apps.
Web Applications:
 Microsoft office.
 Netflix.
 Trello.
Authentications
Methods
 Passwords
 Multi-Factor (MFA)
 Single Sign-on (SSO)
 Biometric
 Token authentication
Authentications Methods
Requires two or more
independent ways to identify
a user, for example Captcha
tests, fingerprints.
Multi-factor (MFA)
Most common methods of
authentication using
password to access.
Passwords
Enables login to multiple
applications via a central
identity provider.
Single Sign-on (SSO)
Grants access to a user or
device based on an access
token ID they possess.
Token authentication
Unique biological
characteristics of an
individual like Facial, speaker
recognition and fingerprint,
eye scanners.
Biometric
Authorization Methods
Discretionary
Access Control
(DAC)
Role-Based
Access Control
(RBAC)
Mandatory
Access Control
(MAC)
Attribute-based
Access Control
(ABAC)
Authorization Methods
Defining which files and memory objects
they can access.
Mandatory Access
Control (MAC)
An entity is authorized if the
authentication system finds that all the
attributes defined in the policy are true.
Attribute-based Access
Control (ABAC)
RBAC builds on predefined roles and
privileges, assigns users to roles, and
configures a system so that only
specific roles can access each object.
Role-Based Access
Control (RBAC)
DAC determines privileges depending
on the specific user and their access
groups.
Discretionary Access
Control (DAC)
Implementation and scenario
Monolithic Application Authentication and
Authorization:
In the application, a security module is
generally used to implement user
authentication and authorization.
For example: Software as a service (SaaS)
office tools (such as Microsoft Office 365).
Implementation and scenario
Monolithic application user authentication
scenario:
• User enter username and password.
• Security module verify identity of the user.
• Session is created for the user with a unique ID
associated with the session.
• A session stores login user information User name,
Role, and Permission.
• server returns the Session Id to the client.
• The client records the Session Id as a cookie and
sends it to the application in subsequent requests.
• The application can then use the Session Id to
verify the user’s identity, without having to enter
a user name and password for authentication
each time.
Implementation and scenario
Monolithic application user authorization
scenario:
• The client accesses the application.
• Session Id is sent to the application along with the
HTTP request.
• The security module generally processes all
received client requests through an authorization
interceptor.
• This interceptor first determines whether the
Session Id exists.
• If the Session Id exists, it knows that the user has
logged in.
• Then, by querying the user rights, it is determined
whether the user can execute the request or not.
Do you have any questions?
References
• https://www.educba.com/authorization-types/
• shorturl.at/sMP47
• https://frontegg.com/blog/user-authorization
• https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/
• https://www.okta.com/identity-101/authentication-vs-authorization/
• https://medium.com/tech-tajawal/microservice-authentication-and-authorization-solutions-e0e5e74b248a
• https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-saas/
• https://frontegg.com/blog/authentication-vs-authorization

More Related Content

Similar to AbedElilahElmahmoumP1.pptx

Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
Manahari Darshika Pemarathna
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application Authentication
RapidValue
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
Caroline Johnson
 
Microsoft-Entra-Identity-and-Access-presentation.pdf
Microsoft-Entra-Identity-and-Access-presentation.pdfMicrosoft-Entra-Identity-and-Access-presentation.pdf
Microsoft-Entra-Identity-and-Access-presentation.pdf
JohnDoe583546
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
Ben Abdallah Helmi
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
Ben Abdallah Helmi
 
76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
ApurvSingh65
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
eshwarvisualpath
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
Ajit Dadresa
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docx
NelSon186520
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Evelyn Donaldson
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based AuthenticationAuthentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
ijtsrd
 
Microsoft identity manoj mittal
Microsoft identity manoj mittalMicrosoft identity manoj mittal
Microsoft identity manoj mittal
Manoj Mittal
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 

Similar to AbedElilahElmahmoumP1.pptx (20)

Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application Authentication
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Microsoft-Entra-Identity-and-Access-presentation.pdf
Microsoft-Entra-Identity-and-Access-presentation.pdfMicrosoft-Entra-Identity-and-Access-presentation.pdf
Microsoft-Entra-Identity-and-Access-presentation.pdf
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
 
76 s201923
76 s20192376 s201923
76 s201923
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docx
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based AuthenticationAuthentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Microsoft identity manoj mittal
Microsoft identity manoj mittalMicrosoft identity manoj mittal
Microsoft identity manoj mittal
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

AbedElilahElmahmoumP1.pptx

  • 1. AUTHENTICATIO AND AUTHORIZATION IN WEB APPLICATIONS SECURITY Supervisor: D. Mayada Al Meghari Abed Elilah Elmahmoum Course :ITCS6322.20447.31.88- Web Applications Security
  • 2. ● Introduction ● Concepts ● Authentication vs. Authorization ● Applications examples ● Authentication Methods ● Authorization Methods ● Implementation and scenario CONTENTS
  • 3. INTRODUCTION It seems that there is no way to go through a day without using authentication and authorization in our real-life and virtual-life.
  • 4. CONCEPTS  Is the process of identifying users that request access to a system, network, or device.  Verify who you are? Authentication
  • 5. CONCEPTS  Is the process of controlling user access via assigned roles & privileges.  What you can do? Authorization
  • 6. Authentication vs. Authorization Authentication Authorization What does it do? Verifies credentials Grants or denies permissions How does it work? Through passwords, biometrics,…. Through settings maintained by security teams Is it visible to the user? Yes No It is changeable by the user? Partially No How does data move? Through ID tokens Through access tokens
  • 7. Applications Exampels Applications that use authentication and authorization. Mobile application:  Social media apps (Facebook, Twitter, LinkedIn….).  Google apps (Gmail, Google Play…..).  Ecommerce apps. Web Applications:  Microsoft office.  Netflix.  Trello.
  • 8. Authentications Methods  Passwords  Multi-Factor (MFA)  Single Sign-on (SSO)  Biometric  Token authentication
  • 9. Authentications Methods Requires two or more independent ways to identify a user, for example Captcha tests, fingerprints. Multi-factor (MFA) Most common methods of authentication using password to access. Passwords Enables login to multiple applications via a central identity provider. Single Sign-on (SSO) Grants access to a user or device based on an access token ID they possess. Token authentication Unique biological characteristics of an individual like Facial, speaker recognition and fingerprint, eye scanners. Biometric
  • 10. Authorization Methods Discretionary Access Control (DAC) Role-Based Access Control (RBAC) Mandatory Access Control (MAC) Attribute-based Access Control (ABAC)
  • 11. Authorization Methods Defining which files and memory objects they can access. Mandatory Access Control (MAC) An entity is authorized if the authentication system finds that all the attributes defined in the policy are true. Attribute-based Access Control (ABAC) RBAC builds on predefined roles and privileges, assigns users to roles, and configures a system so that only specific roles can access each object. Role-Based Access Control (RBAC) DAC determines privileges depending on the specific user and their access groups. Discretionary Access Control (DAC)
  • 12. Implementation and scenario Monolithic Application Authentication and Authorization: In the application, a security module is generally used to implement user authentication and authorization. For example: Software as a service (SaaS) office tools (such as Microsoft Office 365).
  • 13. Implementation and scenario Monolithic application user authentication scenario: • User enter username and password. • Security module verify identity of the user. • Session is created for the user with a unique ID associated with the session. • A session stores login user information User name, Role, and Permission. • server returns the Session Id to the client. • The client records the Session Id as a cookie and sends it to the application in subsequent requests. • The application can then use the Session Id to verify the user’s identity, without having to enter a user name and password for authentication each time.
  • 14. Implementation and scenario Monolithic application user authorization scenario: • The client accesses the application. • Session Id is sent to the application along with the HTTP request. • The security module generally processes all received client requests through an authorization interceptor. • This interceptor first determines whether the Session Id exists. • If the Session Id exists, it knows that the user has logged in. • Then, by querying the user rights, it is determined whether the user can execute the request or not.
  • 15. Do you have any questions?
  • 16. References • https://www.educba.com/authorization-types/ • shorturl.at/sMP47 • https://frontegg.com/blog/user-authorization • https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/ • https://www.okta.com/identity-101/authentication-vs-authorization/ • https://medium.com/tech-tajawal/microservice-authentication-and-authorization-solutions-e0e5e74b248a • https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-saas/ • https://frontegg.com/blog/authentication-vs-authorization