Chapter 18 Auth in Enterprise

Learning objectives:

  • What is the difference between authentication and authorization?
  • What are some different ways to manage permissions? What are the advantages and drawbacks of each?
  • What is some advantages of token-based auth? Why are most organizations adopting it? Are there any drawbacks?
  • For each of the following, is it a username + password method or a token method? PAM, LDAP, Kerberos, SAML, ODIC/OAuth