Keith CaseyforPangea Blogpangea.cloud·Oct 30, 2024Building Authorization in AI AppsWhen we look at the current state of generative AI, we think of products like ChatGPT, Google Gemini, Claude, and similar. Those are all publicly available tools trained on public data and useful for general topics for a general audience. But if we e...97 readsauthorization
Keith CaseyforPangea Blogpangea.cloud·Sep 10, 2024AuthZ: ABAC == trueAll of access control comes down to one fundamental question: How do we grant the right access to the right things to the right people and systems for the right amount of time? Every other question addresses an aspect or nuance within that question. ...authorization
Ever A. Olanoabyteortwo.com·Jan 31, 2024Authentication vs. AuthorizationFirst off, welcome to my first ever post. Hooray! I'd like to go through the letters of the English alphabet with each of my posts and naturally, we start with "A". And I got not one, but two of them for ya. Double hooray! If you're just starting, th...authn
AuthZed Teamauthzed.hashnode.dev·Mar 3, 2021Identity Is Not the Foundation of Permission SystemsHave you ever chatted with a fellow developer about an application's permission system and quickly realized you're also talking about its login system? It's rather unfortunate, but these two entirely distinct systems often get merged together simply ...authorization