authorizationexamples
Authorization examples, sometimes written as authorizationexamples, describe common mechanisms by which access decisions are made after a subject’s identity has been established. They cover the rules, models, and technologies that determine who can do what with which resources, under which conditions.
Common authorization models include role-based access control (RBAC), where permissions are tied to roles assigned to
Examples span multiple domains. In operating systems, Unix-like file permissions control user, group, and other access.
Authorization is distinct from authentication, which verifies identity. Policy-based systems may factor in attributes, roles, resource