27 lines
No EOL
1.4 KiB
Text
Executable file
27 lines
No EOL
1.4 KiB
Text
Executable file
== Overview
|
|
|
|
{{book.project.name}} supports fine-grained authorization policies with a mix and match of different access control
|
|
mechanisms such as:
|
|
|
|
* **Attribute-based Access Control**
|
|
* **Role-based Access Control**
|
|
* **User-based Access Control**
|
|
* **Context-based Access Control**
|
|
* **Rule-based Access Control**
|
|
** Using Javascript
|
|
** Using JBoss Drools
|
|
* **Support for custom ACMs through a Policy Provider SPI**
|
|
|
|
Being based on a set of administrative UIs and a RESTful API, {{book.project.name}} provides the necessary means to create permissions
|
|
for your protected resources and scopes, associate these permissions with authorization policies and enforce authorization
|
|
decisions in your application and services.
|
|
|
|
Considering that today we need to consider a very heterogeneous environment, where users are distributed across different regions, with different local policies,
|
|
using different devices and with a high demand for information sharing, Keycloak Authorization Services provides:
|
|
|
|
* Resource protection using fine-grained authorization policies and different access control mechanisms
|
|
* Centralized Resource, Permission and Policy Management
|
|
* Centralized Policy Decision Point
|
|
* REST security based on a set of REST-based Authorization Services
|
|
* Authorization Workflows and User-Managed Access
|
|
* The necessary means to avoid code replication across projects(and redeploys) and quickly adapt to changes in your security requirements |