26 lines
No EOL
1.3 KiB
Text
Executable file
26 lines
No EOL
1.3 KiB
Text
Executable file
== Overview
|
|
|
|
{{book.project.name}} supports fine-grained authorization policies with a mix and match of different access control
|
|
mechanisms such as:
|
|
|
|
* **Attribute-based Access Control**
|
|
* **Role-based Access Control**
|
|
* **User-based Access Control**
|
|
* **Context-based Access Control**
|
|
* **Rule-based Access Control**
|
|
** Using Javascript
|
|
** Using JBoss Drools
|
|
* **Support for custom ACMs through a Policy Provider SPI**
|
|
|
|
Being based on a set of administrative UIs and a RESTful API, {{book.project.name}} provides the necessary means to create permissions
|
|
for your protected resources and scopes, associate these permissions with authorization policies and enforce authorization
|
|
decisions in your application and services.
|
|
|
|
Considering that today we need to consider a very heterogeneous environment, where users are distributed across different regions, with different local policies,
|
|
using different devices and with a high demand for information sharing, Keycloak Authorization Services can be used as great tool to:
|
|
|
|
* Control your protected resources and the actions that can be performed on them with fine-grained authorization policies
|
|
* Centralized Resource, Permission and Policy Management
|
|
* Authorization Workflows and User-Managed Access
|
|
* Avoid code replication across projects (and redeploys) and quickly adapt to changes in your requirements
|
|
* Auditing |