Briefly describe authorization.

What will be an ideal response?


Authorization picks up where authentication leaves off. After a user is authenticated, the authorization system uses access-control technologies to implement the second phase of protecting resources. It determines if an authenticated user has the correct authorization to access a resource. Authorization enforcement can come in one of two ways: total denial of access to unauthorized users or limiting the extent of access provided to an authorized user. As in authentication, multiple schools of thought have been developed to support authorization over the years.

Computer Science & Information Technology

You might also like to view...

Servers are essential in today's business world because they can centralize security and other resources

Indicate whether the statement is true or false

Computer Science & Information Technology

________ emphasize a cell or range of cells

A) Criteria B) Arguments C) Borders and shading D) Formulas

Computer Science & Information Technology

To authorize your DHCP server, you must be a member of the ________ Adminsgroup

Fill in the blank(s) with correct word

Computer Science & Information Technology

When inserting a table, you must specify the total number of rows and columns required, which is called the ____________________ of the table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology