01642 06 11 11 Arrange Call

Authorisation

Glossary / A

Authorisation Definition:

Authorisation is the process of determining and enforcing what actions, resources, or services a user or system is permitted to access after they have been authenticated. It ensures that users only have access to the resources and functions necessary for their role or purpose, based on defined security policies and access control rules.

What is Authorisation?

Authorisation follows Authentication, where a user's identity is verified. Once authenticated, the Authorisation process evaluates the user's permissions to decide what data, systems, or features they can access. It is a critical component of security, ensuring that only authorised users can perform specific actions, access sensitive data, or execute commands within a system.

Why is Authorisation important?

The purpose of Authorisation is to protect systems and data by limiting access to what is necessary for a user’s role or purpose. This minimises the risk of unauthorised data exposure, reduces the attack surface, and ensures that security policies are enforced consistently. Authorisation mechanisms are essential for maintaining compliance, protecting sensitive information, and providing a secure user experience.

How does Authorisation work?

Authorisation is typically managed using access control models such as Role-Based Access Control (RBAC), where permissions are assigned based on user roles, or Attribute-Based Access Control (ABAC), where access is granted based on user attributes, environmental conditions, or other factors. Implementing Authorisation may involve checking user permissions against access control lists (ACLs) or using Identity and Access Management (IAM) solutions to enforce policies. Web applications often use tokens and claims to manage user permissions dynamically.

Authorisation Examples:

Examples of Authorisation include granting or restricting access to files and folders based on a user’s role within an organisation, limiting the functions a user can perform within a software application, or allowing a user to view, but not edit or delete, certain data within a database. Web applications may use JSON Web Tokens (JWTs) to pass user permissions and ensure secure access control.

Authorisation Issues:

Challenges with Authorisation include managing complex permission structures, ensuring that access policies are up to date, and preventing Privilege Escalation attacks where users gain access to resources they should not. Effective Authorisation requires continuous monitoring, regular audits of access permissions, and adherence to the principle of Least Privilege to minimise security risks.

Our Services