Software Engineering KB

Home

❯

08 Security

❯

01 Authentication and Authorization

❯

Authentication and Authorization

Authentication and Authorization

Feb 10, 20261 min read

  • authentication
  • authorization
  • security

Authentication and Authorization

Back: 08 - Security MOC

Authentication verifies identity (who are you?), while authorization determines access (what can you do?). Together they form the foundation of access control, spanning from password-based login and OAuth 2.0 to role-based and attribute-based access control policies.

Categories

  • Authentication Methods
  • OAuth 2.0
  • OpenID Connect
  • JWT (JSON Web Tokens)
  • Authorization Models
  • Identity Providers

authentication authorization security


Graph View

  • Authentication and Authorization
  • Categories

Backlinks

  • Software Engineering - Map of Content
  • 05 - Software Design and Architecture MOC
  • Authentication Methods
  • Authorization Models
  • Identity Providers
  • JWT (JSON Web Tokens)
  • OAuth 2.0
  • OpenID Connect
  • 08 - Security MOC
  • 11 - Cloud Providers and Proprietary Systems MOC

Created with Quartz v4.5.2 © 2026

  • GitHub