Chapter 18 Auth in Enterprise
Learning objectives:
- What is the difference between authentication and authorization?
- What are some different ways to manage permissions? What are the advantages and drawbacks of each?
- What is some advantages of token-based auth? Why are most organizations adopting it? Are there any drawbacks?
- For each of the following, is it a username + password method or a token method? PAM, LDAP, Kerberos, SAML, ODIC/OAuth