Notes for Codefellows Code 401 301 201 and 102
It is authentication and identity verfication! it controls who can access routes and make changes to an application
access to restricted data, restricting CRUD actions (only allowed to read and post but NOT delete,..)
managing access levels (pair with capabilities)
RBAC takes more of a real world approach to structuring access control. RBAC assigns permissions to particular roles in an organization. Users are then assigned to that particular role. techopedia
wikipedia the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular.
wikipedia an approach to restricting system access to authorized users.
wikipedia otherwise known as a key, is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights.
Skim the following materials in preparation for the upcoming lecture. Note the following as you browse the material, and be prepared to participate in discussions during lecture
Preparation Materials