Each Zorp service can use an Authorization policy to determine whether a client is allowed to access the service. If the authorization is based on the identity of the client, it takes place only after a successful authentication — identity-based authorization can be performed only if the client's identity is known and has been verified. The actual authorization is performed by Zorp, based on the authentication information received from ZAS or extracted from the protocol. Zorp offers various authorization models to ranging from simple (PermitUser
) to advanced (NEyesAuthorization
). Both identity-based and indentity-independent authorization models are available. The configuration of authorization policies is described in the procedure below.
Published on May 30, 2024
© BalaSys IT Ltd.
Send your comments to support@balasys.hu