Externalized Authorization

Applications with non-trivial authorization requirements force developers to invent elaborate schemes to control who should get access to what, why, when and how. System configurations tend to become equally complex. A good portion of development as well as operational efforts are therefore spent on access control. Externalizing authorization from applications therefore brings many benefits.