Glossary

Authorization

Authorization is a crucial cybersecurity process that determines what an authenticated user, device, or system is allowed to do within a network or system.

Once a user’s identity is verified through authentication, authorization controls what resources they can access and what actions they can perform.

This process involves setting permissions and access rights based on roles, responsibilities, or other criteria. For example, an employee might be authenticated to access a company’s network, but authorization rules would determine which files they can read, modify, or delete.

Authorization mechanisms include:

  • Role-Based Access Control (RBAC): Permissions are assigned based on the user’s role within the organisation.
  • Attribute-Based Access Control (ABAC): Access decisions are based on attributes, such as user characteristics, resource types, and environmental conditions.
  • By ensuring users can only access information and functions necessary for their role, authorization helps protect sensitive data and maintain system security.

Glossary

Dive into Exclusive Networks' comprehensive Cybersecurity & IT Glossary.

Back to Glossary

Knowledge Base

Stay current with new ideas, reports and keep informed on the latest cybersecurity trends.

Knowledge Base

Start growing your business

Whether you need a quote, advice, want to become a partner, or want to take advantage of our global services, we are here to help

Get in touch