Authorization is the concept of security management and means verification of authorization to any act or operation. Thus, determination whether the entity may perform given activity or operation (has a power or authority). Usually follows an identity authentication. Sometimes same technical resources can be used (such as identification access card carries information about the identity as well as access permissions).
Use of the authorization in practice: Authorization belongs to the security measures and provides a protection against unauthorized access. It is used in all business processes that require limiting access to people, parts of the software, data or to property or other assets. It is therefore crucial in asset management and in informatics. (see Authorization management)
The authorization in informatics is an integral part of the control access permissions (so-called identity management) to data, files, directories, operations, etc. Authorization in informatics is usually automated (performed by the operating system or by specialized software for access control lists).
Key importance of authorization processes is in the fields where handle sensitive data, such as financial sector, payments on the Internet, etc.
Comments
You cannot contribute to the discussion because it is locked