<br />
<b>Warning</b>:  Undefined array key "global_protection_id" in <b>/home/wikitechy/public_html/interview-questions/wp-content/plugins/content-protector/inc/class-ps-rest-handler.php</b> on line <b>51</b><br />
{"id":788,"date":"2021-07-17T20:15:35","date_gmt":"2021-07-17T20:15:35","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=788"},"modified":"2022-05-05T07:27:58","modified_gmt":"2022-05-05T07:27:58","slug":"what-is-authorization","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","title":{"rendered":"What is Authorization ?"},"content":{"rendered":"<div class=\"TextHeading\">\n<div class=\"hddn\">\n<h2 id=\"what-is-authorization\" class=\"color-pink\" style=\"text-align: justify;\">What is Authorization ?<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-4310 aligncenter\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\" alt=\"\" width=\"935\" height=\"499\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png 935w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-300x160.png 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-768x410.png 768w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-390x208.png 390w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-820x438.png 820w\" sizes=\"(max-width: 935px) 100vw, 935px\" \/><\/p>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><a href=\"https:\/\/www.wikitechy.com\/tutorials\/oauth\/what-is-oauth\" target=\"_blank\" rel=\"noopener\">Authorization<\/a>\u00a0is a security mechanism to determine access levels or user\/client privileges related to system resources.<\/li>\n<li>Including files, services, computer programs, data and application features.<\/li>\n<li>This is the process of granting or denying access to a network resource which allows the user access to various resources based on the user&#8217;s identity.<\/li>\n<li>There are two types of authorization\n<ul>\n<li>Server-side Authorization<\/li>\n<li><a href=\"https:\/\/www.wikitechy.com\/tutorials\/oauth\/oauth-client-credentials\" target=\"_blank\" rel=\"noopener\">Client-side Authorization<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"ImageContent\" style=\"text-align: justify;\">\n<div class=\"hddn\"><img decoding=\"async\" class=\"img-responsive center-block aligncenter\" src=\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/what-is-authorization.jpg\" alt=\"What is Authorization\" \/><\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"server-side-authorization\" class=\"color-purple\">Server-side Authorization<\/h2>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>The server has three authorization modes. Depending on the authorization mode we choose, the server will decide if it accepts or declines an incoming invocation.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-4311 aligncenter\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example.png\" alt=\"\" width=\"2074\" height=\"1006\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example.png 2074w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-300x146.png 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-1024x497.png 1024w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-768x373.png 768w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-1536x745.png 1536w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-2048x993.png 2048w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-390x189.png 390w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-820x398.png 820w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-1180x572.png 1180w\" sizes=\"(max-width: 2074px) 100vw, 2074px\" \/><\/p>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"none\">None<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>This is the simplest type of authorization. No authorization will be performed.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"self\">Self<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>A client will be allowed to use a grid service if the client&#8217;s identity is the same as the service&#8217;s identity.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"gridmap\">Gridmap<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>A gridmap is a list of &#8216;authorized users&#8217; akin to an ACL (Access Control List).<\/li>\n<li>When this type of authorization is used, only the users that are listed in the service&#8217;s gridmap may invoke it.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"client-side-authorization\" class=\"color-purple\">Client-side Authorization<\/h2>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>This allows the client to figure out when it will allow a grid service to be invoked.<\/li>\n<li>This might seem like an odd type of authorization, since authorization is generally seen from the server&#8217;s perspective (&#8220;Do I allow client FOO to connect to grid service BAR?&#8221;).<\/li>\n<li>However, in GSI, clients have every right to be picky about the services they can access.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"none-2\">None<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>No authorization will be performed.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"self-2\">Self<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>The client will authorize an invocation if the service&#8217;s identity is the same as the client.<\/li>\n<li>If we use both client-side and server-side Self authorization, a service can be invoked if and only if its identity matches the client&#8217;s.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"host\">Host<\/h2>\n<\/div>\n<div class=\"Content\">\n<div class=\"hddn\">\n<ul>\n<li style=\"text-align: justify;\">The client will authorize an invocation if the host returns an identity containing the hostname.<\/li>\n<li style=\"text-align: justify;\">This is done using host certificates.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Answer : Authorization is a security mechanism to determine&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"passster_activate_protection":false,"passster_protect_child_pages":"","passster_protection_type":"password","passster_password":"","passster_activate_overwrite_defaults":"","passster_headline":"","passster_instruction":"","passster_placeholder":"","passster_button":"","passster_id":"","passster_activate_misc_settings":"","passster_redirect_url":"","passster_hide":"no","passster_area_shortcode":"","gtb_hide_title":false,"gtb_wrap_title":false,"gtb_class_title":"","gtb_remove_headerfooter":false,"footnotes":""},"categories":[4590],"tags":[195,201,4609,360,5213,5221,5223,5219,5210,5214,5224,5217,5212,5226,5215,221,203,199,363,4606,5225,205,5211,15935,222,362,5227,5222,196,212,213,710,207,4605,366,204,217,5208,5209,288,367,483,206,5220,4608,200,197,4607,5228,5218,5216],"class_list":["post-788","post","type-post","status-publish","format-standard","hentry","category-networking","tag-accenture-interview-questions-and-answers","tag-allstate-solutions-pvt-ltd-interview-questions-and-answers","tag-applied-mate-interview-questions-and-answers","tag-atos-interview-questions-and-answers","tag-authentication-and-authorization","tag-authentication-authorization","tag-authentication-vs-authorization","tag-authorised","tag-authority-definition","tag-authorization","tag-authorization-bearer","tag-authorization-code","tag-authorization-header","tag-authorized-meaning","tag-authorized-user","tag-bharti-airtel-interview-questions-and-answers","tag-capgemini-interview-questions-and-answers","tag-casting-networks-india-pvt-limited-interview-questions-and-answers","tag-ciena-corporation-interview-questions-and-answers","tag-css-corp-pvt-ltd-interview-questions-and-answers","tag-define-authorization","tag-dell-international-services-india-pvt-ltd-interview-questions-and-answers","tag-difference-between-authentication-and-authorization","tag-ecare-technology-labs-interview-questions-and-answers","tag-flipkart-interview-questions-and-answers","tag-hcl-technologies-interview-questions-and-answers","tag-how-to-authorize-a-computer-on-itunes","tag-http-authorization-header","tag-ibm-interview-questions-and-answers","tag-indecomm-global-services-interview-questions-and-answers","tag-infosys-technologies-interview-questions-and-answers","tag-mavenir-interview-questions-and-answers","tag-mphasis-interview-questions-and-answers","tag-ncr-corporation-interview-questions-and-answers","tag-netapp-interview-questions-and-answers","tag-oracle-corporation-interview-questions-and-answers","tag-peoplestrong-interview-questions-and-answers","tag-pre-authorization","tag-prior-authorization","tag-r-systems-interview-questions-and-answers","tag-rbs-india-development-centre-pvt-ltd-interview-questions-and-answers","tag-reliance-industries-ltd-interview-questions-and-answers","tag-sap-labs-india-pvt-ltd-interview-questions-and-answers","tag-spell-authority","tag-tata-communications-interview-questions-and-answers","tag-tech-mahindra-interview-questions-and-answers","tag-unitedhealth-group-interview-questions-and-answers","tag-virtela-interview-questions-and-answers","tag-what-does-authority-mean","tag-what-is-authority","tag-what-is-prior-authorization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Authorization ? - Networking Interview Questions - Wikitechy<\/title>\n<meta name=\"description\" content=\"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Authorization ? - Networking Interview Questions - Wikitechy\" \/>\n<meta property=\"og:description\" content=\"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-17T20:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-05T07:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\",\"name\":\"What is Authorization ? - Networking Interview Questions - Wikitechy\",\"isPartOf\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\",\"datePublished\":\"2021-07-17T20:15:35+00:00\",\"dateModified\":\"2022-05-05T07:27:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757\"},\"description\":\"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\",\"contentUrl\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\",\"width\":935,\"height\":499},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Authorization ? - Networking Interview Questions - Wikitechy","description":"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","og_locale":"en_US","og_type":"article","og_title":"What is Authorization ? - Networking Interview Questions - Wikitechy","og_description":"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","og_site_name":"Wikitechy","article_published_time":"2021-07-17T20:15:35+00:00","article_modified_time":"2022-05-05T07:27:58+00:00","og_image":[{"url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","name":"What is Authorization ? - Networking Interview Questions - Wikitechy","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","datePublished":"2021-07-17T20:15:35+00:00","dateModified":"2022-05-05T07:27:58+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"description":"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage","url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","contentUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","width":935,"height":499},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=788"}],"version-history":[{"count":4,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/788\/revisions"}],"predecessor-version":[{"id":4312,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/788\/revisions\/4312"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}