Advertisement

Authorization and Roles

  • Matthew MacDonald
  • Dan Mabbutt
  • Adam Freeman

Abstract

So far, you’ve seen how to confirm that users are who they say they are and how to retrieve information about those authenticated identities. This gives your application the basic ability to distinguish between different users, but it’s only a starting point. To create a truly secure web application, you need to act upon that identity at various points using authorization.

Keywords

Configuration File Anonymous User Authorization Rule Configuration Feature Role Class 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Matthew MacDonald, Dan Mabbutt, and Adam Freeman 2010

Authors and Affiliations

  • Matthew MacDonald
  • Dan Mabbutt
  • Adam Freeman

There are no affiliations available

Personalised recommendations