Authentication and Authorization Strategy

Authentication and Authorization Strategy Plan

When we developing the web applications that time need to decide a strategy plan for authentication and authorization.


The strategy plan as given below.
  1. In the First steps, we need to identify the our application resources and the resources can be web pages, web services,  HTML pages, data base and network etc.
  2. In the second steps, we need to follow the strategy plan for applications authorization and the authorization strategy can be Role Based or Resources Based.
  3. In the third steps, we need to identify the resources which you are going to access the all layers of your application. The can be access by using the caller's identity, Process identity and Custom identity etc.
  4. In the fourth steps, we need to create the flow of the identity which you are going to use in the applications.
  5. In the fifth steps, we need to chose the authentication approached, The authentication approach is  common scenarios for the web applications. It can be Identities, credential management (SQL Server databases,  active directory etc.), browser type etc.



for more detail, go to the below link



ANIL SINGH

Anil Singh is an author, tech blogger, and software programmer. Book writing, tech blogging is something do extra and Anil love doing it. For more detail, kindly refer to this link..

My Tech Blog - https://www.code-sample.com/
My Books - Book 1 and Book 2

www.code-sample.com/. Powered by Blogger.
^