What is Authorization? - Examples and definition - Auth0 (2024)

  • Intro to IAM
  • What is authorization?

Authorization is the process of giving someone the ability to access a resource.

Of course, this definition may sound obscure, but many situations in real life can help illustrate what authorization means so that you can apply those concepts to computer systems.

A good example is house ownership. The owner has full access rights to the property (the resource) but can grant other people the right to access it. You say that the owner authorizes people to access it. This simple example allows us to introduce a few concepts in the authorization context.

For instance, accessing the house is a permission, that is, an action that you can perform on a resource. Other permissions on the house may be furnishing it, cleaning it, repair it, etc.

A permission becomes a privilege (or right) when it is assigned to someone. So, if you assign permission to furnish your house to your interior decorator, you are granting them that privilege.

On the other hand, the decorator may ask for permission to furnish your house. In this case, the requested permission is a scope, that is, the action that the decorator would like to perform at your house

Sometimes authorization is somewhat related to identity. Think of the process of boarding a plane. You have your boarding pass that states you are authorized to fly with that plane. However, it is not enough for the gate agent to let you get on board. You also need your passport stating your identity. In this case, the gate agent compares the name on the passport with the name on the boarding pass and let you go through if they match.

In the authorization context, your name is an attribute of your identity. Other attributes are your age, your language, your credit card, and anything else relevant in a specific scenario.

Your name written on the passport is a claim, that is, a declaration stating you've got that attribute. Someone reading your name on your passport can be sure of your name because they trust the government that issued your passport.

The boarding pass, along with the proof of identity of consumers, represents a kind of ‘access token’ that grants access rights to jump onto the plane.

In the scenarios described above, you can see that the act of authorizing enables entities to execute tasks that other entities are not allowed to complete.

Computer systems that use authorization work in a similar manner.

Handling Authorization in a Computer System

In computer systems, authorization rules are part of an IT discipline called Identity and Access Management (IAM). Within IAM, authorization and authentication help system managers to control who has access to system resources and set client privileges. The way that IT systems deal with authorization services is very similar to a real-world access control process.

Authorization Use Case

Consider a collaboration tool like Google Docs.

The application allows you to create and share documents. Other permissions include being able to update, delete, comment on a document. If you are the owner of a document, you can share it with someone else and define one or more access policies. For example, you can share your document with someone by letting them just add comments.

In this scenario:

Resource: it’s the document

Resource Owner: this is the user that creates a document, the owner of the document

Authorized User: the user who is given comment rights by the Resource Owner

The following diagram represents the authorization to resource access:What is Authorization? - Examples and definition - Auth0 (1)

Definition of Authorization Using Authorization Strategies

There are several different authorization strategies that computer systems leverage during application deployment. The most prominent ones are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). Recently, Auth0 has been investigating and solving for Relationship Based Access Control (ReBAC). There are multiple other alternatives, including Graph-Based Access Control (GBAC) and Discretionary Access Control (DAC). Each one of these strategies will help application developers deal with different authorization requirements and authorization services.

Attribute-Based Access Control (ABAC) and Authorization

When using ABAC, a computer system defines whether a user has sufficient access privileges to execute an action based on a trait (attribute or claim) associated with that user. An example use case of this authorization process is an online store that sells alcoholic beverages. A user of the online store needs to register and provide proof of their age. In the authorization context, this scenario can be described as follows:

  • The online store is the resource owner

  • The alcoholic beverage is the resource

  • The age of the consumer validated during the registration process is a claim, that is the proof of the user’s age attribute

Presenting the age claim allows the store to process access requests to buy alcohol. So, in this case, the decision to grant access to the resource is made upon the user attribute.

Role-Based Access Control (RBAC) and Authorization

RBAC, on the other hand, treats authorization as permissions associated with roles and not directly with users. A role is nothing but a collection of permissions. For example, imagine that you work as a department manager in an organization. In this situation, you should have permissions that reflect your role, for example, the ability to approve vacation requests and expense requests, assign tasks, and so on. To grant these permissions, a system manager would first create a role called "Manager" (or similar). Then, they would assign these permissions to this role and would associate you with the "Manager" role. Of course, other users that need the same set of permissions can be associated with that role.

The advantage of using RBAC is that managing authorization privileges becomes easier because system managers can deal with users and permissions in bulk instead of having to deal with them one by one.

Relationship-Based Access Control (ReBAC) and Authorization

Relationship Based Access Control examines the following question in regards to authorization: “Does this user have a sufficient relationship to this object or action such that they can access it?” The relationship can come via a user attribute, such as being a member of a role group related to the object, or having a direct relationship, such as being shared on a document. Sometimes a traversal of a graph of groups, roles, organizations, and objects requires exploring many nodes to establish a relationship between a user and what they are trying to do. Which relationships are critical to gaining access and the permissions that those relationships grant is up to the implementer of the ReBAC system.

Auth0 has recently released a Developer Community Preview for our upcoming Auth0 Fine Grained Authorization product, based on ReBAC. You can learn more at our developer preview page for Fine Grained Authorization.

Want to learn more?

Keep reading at our Intro to IAM page to explore more topics around Identity and Access Management.

Table of contents

  • Handling Authorization in a Computer System
  • Authorization Use Case
  • Definition of Authorization Using Authorization Strategies
  • Attribute-Based Access Control (ABAC) and Authorization
  • Role-Based Access Control (RBAC) and Authorization
  • Relationship-Based Access Control (ReBAC) and Authorization

Solve your authorization

Watch this webinar to see how one company solved their authrization problems with Auth0.

Watch the webinar

Quick assessment

What reasons would you use authorization to control a computer resource? (select all that apply)

Quick assessment

Which authorization strategy allows you to create collections of permissions that can be easily assigned or removed to a user all at once?

What is Authorization? - Examples and definition - Auth0 (2024)

FAQs

What is Authorization? - Examples and definition - Auth0? ›

Authorization is the process of giving someone the ability to access a resource. Of course, this definition may sound obscure, but many situations in real life can help illustrate what authorization means so that you can apply those concepts to computer systems. A good example is house ownership.

What is authorization with an example? ›

At its most basic level, authorization is allowing access to certain applications and information with a username and password. A user might be authorized to access a word processor, an email client, a CRM and more. With basic authorization, users would have a distinct user ID and password for each system.

What is an example of authorization to operate? ›

ATOs are often used in government organizations to manage risk by evaluating and certifying each new product before it's approved for use. Private companies also use ATOs. An example of an ATO is the requirement of an authority to operate before a software program can be installed by an employee on a company network.

What is authorisation in simple words? ›

Authorization is the process of giving someone permission to have access to something.

What are the three types of authorization? ›

Permissions Commonly Used in Authorization
  • Role-based permissions—grants permissions based on a group of users with a shared business role. ...
  • Device permissions—grants permissions based on the device that is accessing the resource. ...
  • Location permissions—grants permissions based on the user or entity's location.
Aug 19, 2024

What is the best example of authorization? ›

A good example is house ownership. The owner has full access rights to the property (the resource) but can grant other people the right to access it. You say that the owner authorizes people to access it. This simple example allows us to introduce a few concepts in the authorization context.

What is a real life example of authentication and authorization? ›

Comparing these processes to a real-world example, when you go through security in an airport, you show your ID to authenticate your identity. Then, when you arrive at the gate, you present your boarding pass to the flight attendant, so they can authorize you to board your flight and allow access to the plane.

Can you give me an example of authorization letter? ›

I, [Your Name], hereby authorize [Recipient's Name] to [Specify the purpose or scope of authorization, e.g., act on my behalf, represent me in meetings, sign documents, make financial transactions, etc.]. This authorization is effective from [Start Date] to [End Date] unless otherwise revoked or modified in writing.

What is an example of work authorization? ›

Your Green Card (Form I-551, Permanent Resident Card) is evidence of your employment authorization. You also do not need to apply for an EAD if you have a nonimmigrant status [MJM1] that authorizes you to work for a specific employer incident to your status (for example, you are an H-1B, L-1B, O, or P nonimmigrant).

What best describes authorization? ›

Authorization is a process by which a server determines if the client has permission to use a resource or access a file.

What's the difference between authentication and authorization? ›

Authentication is a process to authenticate a user, that is, to verify that someone is who they say they are. Authorization is about determining a user's level of access and then granting access based on that level.

What is an example of authorise? ›

to give official permission for something to happen, or to give someone official permission to do something: Who authorized this expenditure? [ + to infinitive ] I authorized my bank to pay her £3,000. Thesaurus: synonyms, antonyms, and examples.

What is the purpose of authorization? ›

Authorization is the security process that determines a user or service's level of access. In technology, we use authorization to give users or services permission to access some data or perform a particular action.

What is an example of authorization in security? ›

Giving someone permission to download a particular file on a server or providing individual users with administrative access to an application are good examples of authorization. In secure environments, authorization must always follow authentication.

How does Auth0 work? ›

Auth0's Authorization Core allows you to implement role-based access control. You can create roles, assign roles to users, and define permissions. If you want to manage access based on browser behaviors, you can limit the lifetime of a session.

Is OAuth authentication or authorization? ›

OAuth is about authorization and not authentication. Authorization is asking for permission to do stuff. Authentication is about proving you are the correct person because you know things.

What is an example of authorization to claim a document? ›

Dear [Recipient's Name], I, [Your Full Name], hereby authorize [Authorized Person's Full Name] to act on my behalf to collect [Specify the Document] from [Location or office where the document is held]. This authorization is valid from [Starting Date] until [Ending Date], unless otherwise revoked by me.

Top Articles
How Magnets are Used in the Automotive Industry
How long does it take to launch an eCommerce site?
My E Chart Elliot
Jailbase Orlando
Amtrust Bank Cd Rates
La connexion à Mon Compte
Women's Beauty Parlour Near Me
Ecers-3 Cheat Sheet Free
Visustella Battle Core
Jscc Jweb
OSRS Dryness Calculator - GEGCalculators
Betonnen afdekplaten (schoorsteenplaten) ter voorkoming van lekkage schoorsteen. - HeBlad
Gwdonate Org
Gma Deals And Steals Today 2022
Operation Cleanup Schedule Fresno Ca
R Cwbt
Missed Connections Dayton Ohio
Byui Calendar Fall 2023
St. Petersburg, FL - Bombay. Meet Malia a Pet for Adoption - AdoptaPet.com
Pinellas Fire Active Calls
Acts 16 Nkjv
Wsop Hunters Club
Popular Chinese Restaurant in Rome Closing After 37 Years
Dallas Mavericks 110-120 Golden State Warriors: Thompson leads Warriors to Finals, summary score, stats, highlights | Game 5 Western Conference Finals
Happy Life 365, Kelly Weekers | 9789021569444 | Boeken | bol
Sunset Time November 5 2022
Yosemite Sam Hood Ornament
3 2Nd Ave
BJ 이름 찾는다 꼭 도와줘라 | 짤방 | 일베저장소
Hellraiser 3 Parents Guide
Combies Overlijden no. 02, Stempels: 2 teksten + 1 tag/label & Stansen: 3 tags/labels.
Maisons près d'une ville - Štanga - Location de vacances à proximité d'une ville - Štanga | Résultats 201
Ihs Hockey Systems
Stubhub Elton John Dodger Stadium
Missing 2023 Showtimes Near Mjr Southgate
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
Does Iherb Accept Ebt
Sinai Sdn 2023
Claim loopt uit op pr-drama voor Hohenzollern
Ktbs Payroll Login
Cheetah Pitbull For Sale
Directions To Advance Auto
Thelemagick Library - The New Comment to Liber AL vel Legis
Aurora Il Back Pages
Silive Obituary
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Craigslist Com Brooklyn
Deviantart Rwby
Costco Gas Price Fort Lauderdale
Obituaries in Westchester, NY | The Journal News
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 5324

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.