Page created: 30 Sep 2020
|
Page updated: 30 Sep 2020
Once we have an authenticated user (and their user profile), the next event is the authorization and access control stage. The application can use the attributes defined in the user profile (whether that information was received during the authentication or was provided in an alternate method) to make authorization decisions and determine theĆ appropriate level of access to the user.