{"id":788,"date":"2021-07-17T20:15:35","date_gmt":"2021-07-17T20:15:35","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=788"},"modified":"2022-05-05T07:27:58","modified_gmt":"2022-05-05T07:27:58","slug":"what-is-authorization","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","title":{"rendered":"What is Authorization ?"},"content":{"rendered":"<div class=\"TextHeading\">\n<div class=\"hddn\">\n<h2 id=\"what-is-authorization\" class=\"color-pink\" style=\"text-align: justify;\">What is Authorization ?<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-4310 aligncenter\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\" alt=\"\" width=\"935\" height=\"499\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png 935w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-300x160.png 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-768x410.png 768w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-390x208.png 390w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-820x438.png 820w\" sizes=\"(max-width: 935px) 100vw, 935px\" \/><\/p>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><a href=\"https:\/\/www.wikitechy.com\/tutorials\/oauth\/what-is-oauth\" target=\"_blank\" rel=\"noopener\">Authorization<\/a>\u00a0is a security mechanism to determine access levels or user\/client privileges related to system resources.<\/li>\n<li>Including files, services, computer programs, data and application features.<\/li>\n<li>This is the process of granting or denying access to a network resource which allows the user access to various resources based on the user\u2019s identity.<\/li>\n<li>There are two types of authorization\n<ul>\n<li>Server-side Authorization<\/li>\n<li><a href=\"https:\/\/www.wikitechy.com\/tutorials\/oauth\/oauth-client-credentials\" target=\"_blank\" rel=\"noopener\">Client-side Authorization<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"ImageContent\" style=\"text-align: justify;\">\n<div class=\"hddn\"><img decoding=\"async\" class=\"img-responsive center-block aligncenter\" src=\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/what-is-authorization.jpg\" alt=\"What is Authorization\" \/><\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"server-side-authorization\" class=\"color-purple\">Server-side Authorization<\/h2>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>The server has three authorization modes. Depending on the authorization mode we choose, the server will decide if it accepts or declines an incoming invocation.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-4311 aligncenter\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example.png\" alt=\"\" width=\"2074\" height=\"1006\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example.png 2074w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-300x146.png 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-1024x497.png 1024w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-768x373.png 768w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-1536x745.png 1536w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-2048x993.png 2048w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-390x189.png 390w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-820x398.png 820w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization-example-1180x572.png 1180w\" sizes=\"(max-width: 2074px) 100vw, 2074px\" \/><\/p>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"none\">None<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>This is the simplest type of authorization. No authorization will be performed.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"self\">Self<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>A client will be allowed to use a grid service if the client\u2019s identity is the same as the service\u2019s identity.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"gridmap\">Gridmap<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>A gridmap is a list of \u2018authorized users\u2019 akin to an ACL (Access Control List).<\/li>\n<li>When this type of authorization is used, only the users that are listed in the service\u2019s gridmap may invoke it.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"client-side-authorization\" class=\"color-purple\">Client-side Authorization<\/h2>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>This allows the client to figure out when it will allow a grid service to be invoked.<\/li>\n<li>This might seem like an odd type of authorization, since authorization is generally seen from the server\u2019s perspective (\u201cDo I allow client FOO to connect to grid service BAR?\u201d).<\/li>\n<li>However, in GSI, clients have every right to be picky about the services they can access.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"none-2\">None<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>No authorization will be performed.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"self-2\">Self<\/h2>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>The client will authorize an invocation if the service\u2019s identity is the same as the client.<\/li>\n<li>If we use both client-side and server-side Self authorization, a service can be invoked if and only if its identity matches the client\u2019s.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"subheading\" style=\"text-align: justify;\">\n<h2 id=\"host\">Host<\/h2>\n<\/div>\n<div class=\"Content\">\n<div class=\"hddn\">\n<ul>\n<li style=\"text-align: justify;\">The client will authorize an invocation if the host returns an identity containing the hostname.<\/li>\n<li style=\"text-align: justify;\">This is done using host certificates.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Answer : Authorization is a security mechanism to determine&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4590],"tags":[195,201,4609,360,5213,5221,5223,5219,5210,5214,5224,5217,5212,5226,5215,221,203,199,363,4606,5225,205,5211,15935,222,362,5227,5222,196,212,213,710,207,4605,366,204,217,5208,5209,288,367,483,206,5220,4608,200,197,4607,5228,5218,5216],"class_list":["post-788","post","type-post","status-publish","format-standard","hentry","category-networking","tag-accenture-interview-questions-and-answers","tag-allstate-solutions-pvt-ltd-interview-questions-and-answers","tag-applied-mate-interview-questions-and-answers","tag-atos-interview-questions-and-answers","tag-authentication-and-authorization","tag-authentication-authorization","tag-authentication-vs-authorization","tag-authorised","tag-authority-definition","tag-authorization","tag-authorization-bearer","tag-authorization-code","tag-authorization-header","tag-authorized-meaning","tag-authorized-user","tag-bharti-airtel-interview-questions-and-answers","tag-capgemini-interview-questions-and-answers","tag-casting-networks-india-pvt-limited-interview-questions-and-answers","tag-ciena-corporation-interview-questions-and-answers","tag-css-corp-pvt-ltd-interview-questions-and-answers","tag-define-authorization","tag-dell-international-services-india-pvt-ltd-interview-questions-and-answers","tag-difference-between-authentication-and-authorization","tag-ecare-technology-labs-interview-questions-and-answers","tag-flipkart-interview-questions-and-answers","tag-hcl-technologies-interview-questions-and-answers","tag-how-to-authorize-a-computer-on-itunes","tag-http-authorization-header","tag-ibm-interview-questions-and-answers","tag-indecomm-global-services-interview-questions-and-answers","tag-infosys-technologies-interview-questions-and-answers","tag-mavenir-interview-questions-and-answers","tag-mphasis-interview-questions-and-answers","tag-ncr-corporation-interview-questions-and-answers","tag-netapp-interview-questions-and-answers","tag-oracle-corporation-interview-questions-and-answers","tag-peoplestrong-interview-questions-and-answers","tag-pre-authorization","tag-prior-authorization","tag-r-systems-interview-questions-and-answers","tag-rbs-india-development-centre-pvt-ltd-interview-questions-and-answers","tag-reliance-industries-ltd-interview-questions-and-answers","tag-sap-labs-india-pvt-ltd-interview-questions-and-answers","tag-spell-authority","tag-tata-communications-interview-questions-and-answers","tag-tech-mahindra-interview-questions-and-answers","tag-unitedhealth-group-interview-questions-and-answers","tag-virtela-interview-questions-and-answers","tag-what-does-authority-mean","tag-what-is-authority","tag-what-is-prior-authorization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Authorization ? - Networking Interview Questions - Wikitechy<\/title>\n<meta name=\"description\" content=\"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Authorization ? - Networking Interview Questions - Wikitechy\" \/>\n<meta property=\"og:description\" content=\"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-17T20:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-05T07:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\"},\"headline\":\"What is Authorization ?\",\"datePublished\":\"2021-07-17T20:15:35+00:00\",\"dateModified\":\"2022-05-05T07:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/\"},\"wordCount\":305,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/authorization.png\",\"keywords\":[\"Accenture interview questions and answers\",\"Allstate Solutions Pvt Ltd interview questions and answers\",\"Applied Mate interview questions and answers\",\"Atos interview questions and answers\",\"authentication and authorization\",\"authentication authorization\",\"authentication vs authorization\",\"authorised\",\"authority definition\",\"authorization\",\"authorization bearer\",\"authorization code\",\"authorization header\",\"authorized meaning\",\"authorized user\",\"Bharti Airtel interview questions and answers\",\"Capgemini interview questions and answers\",\"CASTING NETWORKS INDIA PVT LIMITED interview questions and answers\",\"Ciena Corporation interview questions and answers\",\"CSS Corp Pvt Ltd interview questions and answers\",\"define authorization\",\"Dell International Services India Pvt Ltd interview questions and answers\",\"difference between authentication and authorization\",\"ecare technology labs interview questions and answers\",\"Flipkart interview questions and answers\",\"HCL Technologies interview questions and answers\",\"how to authorize a computer on itunes\",\"http authorization header\",\"IBM interview questions and answers\",\"Indecomm Global Services interview questions and answers\",\"Infosys Technologies interview questions and answers\",\"Mavenir interview questions and answers\",\"Mphasis interview questions and answers\",\"NCR Corporation interview questions and answers\",\"NetApp interview questions and answers\",\"Oracle Corporation interview questions and answers\",\"PeopleStrong interview questions and answers\",\"pre authorization\",\"prior authorization\",\"R Systems interview questions and answers\",\"RBS India Development Centre Pvt Ltd interview questions and answers\",\"Reliance Industries Ltd interview questions and answers\",\"SAP Labs India Pvt Ltd interview questions and answers\",\"spell authority\",\"Tata Communications interview questions and answers\",\"Tech Mahindra interview questions and answers\",\"UnitedHealth Group interview questions and answers\",\"Virtela interview questions and answers\",\"what does authority mean\",\"what is authority\",\"what is prior authorization\"],\"articleSection\":[\"Networking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/\",\"name\":\"What is Authorization ? - Networking Interview Questions - Wikitechy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/authorization.png\",\"datePublished\":\"2021-07-17T20:15:35+00:00\",\"dateModified\":\"2022-05-05T07:27:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\"},\"description\":\"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/what-is-authorization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/authorization.png\",\"contentUrl\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/authorization.png\",\"width\":935,\"height\":499},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#website\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/author\\\/editor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Authorization ? - Networking Interview Questions - Wikitechy","description":"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","og_locale":"en_US","og_type":"article","og_title":"What is Authorization ? - Networking Interview Questions - Wikitechy","og_description":"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","og_site_name":"Wikitechy","article_published_time":"2021-07-17T20:15:35+00:00","article_modified_time":"2022-05-05T07:27:58+00:00","og_image":[{"url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","type":"","width":"","height":""}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#article","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/"},"author":{"name":"Editor","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"headline":"What is Authorization ?","datePublished":"2021-07-17T20:15:35+00:00","dateModified":"2022-05-05T07:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/"},"wordCount":305,"commentCount":0,"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","keywords":["Accenture interview questions and answers","Allstate Solutions Pvt Ltd interview questions and answers","Applied Mate interview questions and answers","Atos interview questions and answers","authentication and authorization","authentication authorization","authentication vs authorization","authorised","authority definition","authorization","authorization bearer","authorization code","authorization header","authorized meaning","authorized user","Bharti Airtel interview questions and answers","Capgemini interview questions and answers","CASTING NETWORKS INDIA PVT LIMITED interview questions and answers","Ciena Corporation interview questions and answers","CSS Corp Pvt Ltd interview questions and answers","define authorization","Dell International Services India Pvt Ltd interview questions and answers","difference between authentication and authorization","ecare technology labs interview questions and answers","Flipkart interview questions and answers","HCL Technologies interview questions and answers","how to authorize a computer on itunes","http authorization header","IBM interview questions and answers","Indecomm Global Services interview questions and answers","Infosys Technologies interview questions and answers","Mavenir interview questions and answers","Mphasis interview questions and answers","NCR Corporation interview questions and answers","NetApp interview questions and answers","Oracle Corporation interview questions and answers","PeopleStrong interview questions and answers","pre authorization","prior authorization","R Systems interview questions and answers","RBS India Development Centre Pvt Ltd interview questions and answers","Reliance Industries Ltd interview questions and answers","SAP Labs India Pvt Ltd interview questions and answers","spell authority","Tata Communications interview questions and answers","Tech Mahindra interview questions and answers","UnitedHealth Group interview questions and answers","Virtela interview questions and answers","what does authority mean","what is authority","what is prior authorization"],"articleSection":["Networking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/","name":"What is Authorization ? - Networking Interview Questions - Wikitechy","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","datePublished":"2021-07-17T20:15:35+00:00","dateModified":"2022-05-05T07:27:58+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"description":"What is Authorization ? - Networking Interview Questions - Authorization is a security mechanism to determine access levels","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-authorization\/#primaryimage","url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","contentUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2021\/07\/authorization.png","width":935,"height":499},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=788"}],"version-history":[{"count":4,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/788\/revisions"}],"predecessor-version":[{"id":4312,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/788\/revisions\/4312"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}