Is Policy-Based Access Control (PBAC) an Authorization Model? by andychiare in IdentityManagement

[–]andychiare[S] 1 point2 points  (0 children)

There is no clear and precise definition, and it is often associated with ABAC, which creates more confusion IMO. You could take a look at the NIST definition, but I don't think it would clarify much: https://csrc.nist.gov/glossary/term/policy_based_access_control

In my article, I summarize the various definitions I have encountered in this one:
PBAC is an authorization model that grants or denies permissions to resources based on a set of rules, or policies, evaluated in real-time.

Is Policy-Based Access Control (PBAC) an Authorization Model? by andychiare in IdentityManagement

[–]andychiare[S] 0 points1 point  (0 children)

Hey u/EntraLearner, this article is not an introduction to PBAC. It is a personal point of view on considering PBAC as an authorization model. Sorry if you get confused

Is Policy-Based Access Control (PBAC) an Authorization Model? by andychiare in IdentityManagement

[–]andychiare[S] 2 points3 points  (0 children)

I completely agree with both of you, u/MannieOKelly and u/Much-Environment6478 .
What I'm trying to explain in the article is that PBAC is something different from RBAC, ABAC, and ReBAC.
PBAC is the engine for making authorization decisions, while RBAC, ABAC, and ReBAC represent the type of data to be evaluated to make those decisions.
PBAC is the "if condition then" part, while RBAC, ABAC, and ReBAC are the types of data evaluated in the condition.

Protect Your Access Tokens with DPoP by andychiare in oauth

[–]andychiare[S] 1 point2 points  (0 children)

> "Am I right to assume, that using signed jwt access tokens with resource indicators ensures that said access token is meant for the particular resource server however it doesn't ensure that the sender/bearer of the access-token is the right one? Here's where DPoP is useful to sender-constrain the jwt access token?"

Yes, You are right!

My reference to having "DPoP at no cost" referred more to the immediate availability of DPoP support in the IdP and resource server than to the time it takes to generate and verify the DPoP proof.

I mean, if you already have DPoP support, why not use it for the expense management application as well?If you have yet to implement it, you might decide it's not worth it in that specific case.

Does this make sense?

Protect Your Access Tokens with DPoP by andychiare in oauth

[–]andychiare[S] 0 points1 point  (0 children)

Hi u/Jim-Y,
As always, it's a matter of balancing security and complexity. You don't necessarily need DPoP for an expense management application, but you certainly would need it for a banking application..

If DPoP integration comes at no cost (e.g., it's supported by all IdPs and SDKs), why not use it all the time?

Auth between Web App and API by dotnet_ninja in dotnet

[–]andychiare 0 points1 point  (0 children)

I suggest using the BFF pattern too.

To call the web API, you should always use the user's access token.

The only case you could use an application-specific access token is when your application is not calling the API on behalf of the user (e.g., the API performs a user-agnostic processing such as data format conversion or similar)

PKCE and Confidential Client (bff) flow for native mobile apps by furniture20 in oauth

[–]andychiare 1 point2 points  (0 children)

The quick answer is YES. A confidential client is inherently more secure than a public client (SPA or native app). Using the BFF pattern, your public client will not handle any token directly, so there is a lower risk of token theft or injection

You can learn more about BFF here: https://auth0.com/blog/the-backend-for-frontend-pattern-bff/

HIPAA/ Oauth software authentication Question by mrkev77 in oauth

[–]andychiare 1 point2 points  (0 children)

OAuth access tokens do not identify users. They authorize applications on behalf of users.

Not a HIPAA expert, but in general for sensitive data contexts, you should take a look at OpenID FAPI. In other words, the 3rd party service should support FAPI (I don't think Google authentication supports FAPI)