In my previous deep dive, I explored Authentication.
This time I look at the other half of system security, Authorization.
From simple role checks to OAuth based delegation, this post walks through how modern systems enforce Authorization.
https://www.bytefork.dev/how-authorization-works/
This time I look at the other half of system security, Authorization.
From simple role checks to OAuth based delegation, this post walks through how modern systems enforce Authorization.
https://www.bytefork.dev/how-authorization-works/
