Externalized Dynamic Authorization in a [Micro]Services World

Key Takeaways:

  • Enforcing authorization on the response leg to incorporate characteristics of the resources being protected
  • Utilizing scopes only for what they were intended: delegated consent
  • Filtering data at the Policy Enforcement Point
  • Deploying authorization services as a microservice

Fill out the form below to view this webinar.