April 17, 2024, 6 a.m. | Ambassador

DEV Community dev.to

Authentication, who you are, is necessary for security in all software applications, but it isn’t sufficient. Once you have authenticated your users, the next step is to control their access within your application. Authorization, what you can do, allows you to control resource access and enforce permissions based on predefined roles and policies. Authorization is where Role-Based Access Control (RBAC) comes into play.


RBAC regulates resource access based on the roles assigned to individual users within an organization. In …

access application applications authentication authorization can control deployment isn kubernetes master next permissions policies rbac resource roles security software software applications

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Security Compliance Manager

@ Aptiv | USA Boston Software Office 100 Northern - Eng

Senior Radar Threat Analyst | Secret clearance

@ Northern Trust | USA CA Point Mugu - 575 I Ave, Bldg 3015 (CAC212)

Space Information Systems Security Engineer (ISSE)

@ Parsons Corporation | USA VA Chantilly (Client Site)

Information Systems Security Manager -Journeyman

@ Parsons Corporation | USA CO Colorado Springs (5450 Tech Center Drive)

Information Systems Security Officer (ISSO) II

@ Northern Trust | USA CA Riverside - Customer Proprietary (CAC225)