2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) 2019
DOI: 10.23919/eecsi48112.2019.8977061
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Role-Based Access Control on OAuth 2.0 as Authentication and Authorization System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0
5

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 5 publications
0
2
0
5
Order By: Relevance
“…There is no exception to this for the implementation of an identity management model using the OAuth2 protocol. Another proposed OAuth2 authorization model, in [ 28 ], presents interconnection between OAuth2 protocol and RBAC. Each scope describes the context that is available to the user and the functions and constraints that are applied to the user.…”
Section: Related Work On Access Control In Microservicesmentioning
confidence: 99%
“…There is no exception to this for the implementation of an identity management model using the OAuth2 protocol. Another proposed OAuth2 authorization model, in [ 28 ], presents interconnection between OAuth2 protocol and RBAC. Each scope describes the context that is available to the user and the functions and constraints that are applied to the user.…”
Section: Related Work On Access Control In Microservicesmentioning
confidence: 99%
“…Sebagai contoh di perguruan tinggi, proses belajar mengajar yang semula tatap muka beralih ke platform online, memanfaatkan berbagai aplikasi Learning Management System (LMS) dan online meeting seperti Zoom, Google Meet, Microsoft Teams, dan Cisco Webex Meeting [1]. Selain SaaS, perguruan tinggi juga masih menggunakan aplikasi pada infrastruktur onpremises, dimana sebagian besar monolith dan menggunakan role-based access control (RBAC) [2]. Dengan semakin banyaknya aplikasi dan sumber daya yang tersedia untuk pengajar, staf, dan mahasiswa, penyediaan akses yang seamless menjadi semakin penting.…”
Section: Pendahuluanunclassified
“…Como exemplo, o OAuth 2.0, que atua como um framework para garantir a seguranc ¸a de cada microsservic ¸o, permite que o cliente se autentique no servidor de autorizac ¸ão e obtenha um token de acesso, emitindo uma solicitac ¸ão ao usuário para conceder uma sessão [Pasomsup and Limpiyakorn 2021]. O objetivo é permitir que os usuários autorizem aplicativos de terceiros a acessarem seus recursos protegidos sem compartilhar suas credenciais de login [Triartono et al 2019]. Um outro método que oferece um logon único e provisionamento de identidade para usuários em diferentes aplicativos é o OpenID Connect, possibilitando que os usuários tenham apenas uma identidade digital.…”
Section: Soluc ¸õEs De Autenticac ¸ãO E Autorizac ¸ãO Em Microsservic...unclassified
“…Nesse modelo os privilégios são associados aos papéis ou grupos de papéis. Portanto, um usuário terá todas as permissões correspondentes ao papel ao qual ele pertence [Triartono et al 2019]. Outra soluc ¸ão que atua como um nível intermediário, recebendo as solicitac ¸ões dos clientes e as direcionando para o servic ¸o adequado, é o API Gateway.…”
Section: Soluc ¸õEs De Autenticac ¸ãO E Autorizac ¸ãO Em Microsservic...unclassified