ELI5: What is Authorization?

Once the school knows who you are, authorization is about what you’re allowed to do. A regular student can go to class but can’t walk into the principal’s office and read private files. A teacher can go places students can’t. Authorization is the set of rules that says “you’re allowed to do this, but not that.” On computers, it works the same way — after you log in, the system checks what you’re actually permitted to see and change.

Overview

Authorization is the process of determining what an authenticated entity is allowed to do within a system. It occurs after authentication and defines the scope of access — which resources can be read, modified, created, or deleted. Authorization is enforced through access control models, policies, and permission structures that align with organizational security requirements.

Key Concepts

  • Authorization vs. Authentication — authentication proves identity; authorization defines permissions
  • Principle of least privilege — grant only the minimum access necessary for a role or task
  • Separation of duties — divide critical tasks among multiple people to prevent fraud
  • Access control models — formal frameworks for authorization decisions (see access-control-models)
    • DAC (Discretionary) — resource owner controls access
    • MAC (Mandatory) — system-enforced labels and clearances
    • RBAC (Role-Based) — permissions assigned to roles, users assigned to roles
    • ABAC (Attribute-Based) — policies based on user/resource/environment attributes
    • Rule-Based — access determined by predefined rules (e.g., time-of-day restrictions)
  • Permission inheritance — child objects inherit permissions from parent containers
  • Implicit deny — if no rule explicitly grants access, access is denied by default
  • OAuth 2.0 — authorization framework for delegated access; issues access tokens (not authentication)
  • Conditional access — dynamic authorization based on risk signals (device compliance, location, behavior)

Exam Tips

Remember

OAuth is for Authorization, NOT Authentication. OAuth grants access tokens for resource access. OpenID Connect (OIDC) adds authentication on top of OAuth. The exam tests this distinction.

Implicit Deny

If a question describes a firewall or ACL scenario where no rule matches, the answer is always deny. This is a core security principle.

Connections

Practice Questions

Scenario

See case-authorization for a practical DevOps scenario applying these concepts.