Authentication and Authorization (Day 129)
May 25, 2022•93 words
Total hours: 246.000
Top three:
1) Authentication
Split into three seperate levels to plan and design based on threat and security requirements instead of providing just one size fits all.
Despite that being what I wanted from the get go and to design an application with 0 settings or close to 0. But really wanted 0 settings options.
2) Authorization
This is different than than authentication. It’s designed to be a second layer of design for cautious or strict mode.
3) Key Management
Still not fully figured out.