Authorization patterns
The solution patterns for authorization are discussed in the following sections.
Access control pattern
We will look into the following example.
Problem
How do we control user access by determining their privileges and provide access to a heterogenous cloud environment consisting of services and resources?
Context
An administrator of a cloud for an enterprise should also be able to define common control rules and customize them as needed. There is also a need to enable granular access to specific cloud resources and services.
The problem to be solved is to authorize a user and provide specific access to cloud resources, services, and applications. The solution should manage access to cloud resources by different types of users as well as services.
The IAM administrator should be able to define and enforce security policies. The policy should apply the principle of least privilege, which gives users only the required permission to execute...