3rd Lec - Part 2
3rd Lec - Part 2
3rd Lec - Part 2
Security:
Principles and
Practice
Chapter 4: Access Control
Authorization Are you allowed to do that?
Restrictions on actions of authenticated users
Authorization refers to the process of determining whether
a user, system, or application has the right or permission to
access a resource, perform an action, or use a service. It is a
critical aspect of access control and ensures that only
authorized entities can interact with protected resources.
Authorization is a form of access control
Access Control
“The prevention of unauthorized use of a resource,
including the prevention of use of a resource in an
unauthorized manner“
Central element of Information security
Assume have users and groups
◦ authenticate to system
◦ assigned access rights to certain resources on system
Access Control Principles
Access control policies
Many-to-many
relationship between
users and roles
Role-users and
roles-object
access matrix
Example of role
hierarchy
Director has most privileges
Each role inherits all privileges from lower
roles
A role can inherit from multiple roles
Additional privileges can be assigned to a
role
Mandatory access control
(MAC)