{"id":46176,"date":"2022-04-13T00:00:00","date_gmt":"2022-04-13T00:00:00","guid":{"rendered":"urn:uuid:c3e85aae-1d7e-045e-3357-3b28face5e72"},"modified":"2022-04-13T00:00:00","modified_gmt":"2022-04-13T00:00:00","slug":"cybersecurity-basics-authentication-and-authorization","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/","title":{"rendered":"Cybersecurity Basics: Authentication and Authorization"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/d\/cybersecurity-basics-app-authentication-authorization\/tn-cyber-authentication.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/d\/cybersecurity-basics-app-authentication-authorization\/tn-cyber-authentication.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">What is identity and access management?<\/span><\/p>\n<p>Identity and access management (IAM) ensures the right people in the right job roles can access the tools, systems, and services absolutely necessary to do their jobs. It is part of the foundation to a strong <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/22\/d\/zero-trust-security-devops-integrations.html\">zero trust approach<\/a> that answers two fundamental questions you should be asking about every solution you build: who is that and what have we allowed them to do?<\/p>\n<p><span class=\"body-subhead-title\">The \u201cWho\u201d<\/span><\/p>\n<p>Determining who you are is called \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Authentication\" target=\"_blank\" rel=\"noopener\">authentication<\/a>.\u201d<\/p>\n<p>This is a process that we encounter all the time. Every time we log in, we\u2019re authenticating to a system.<\/p>\n<p>Usually, we do this with a unique username and password. To provide additional security and assurances, multi-factor authentication is highly recommended.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\" target=\"_blank\" rel=\"noopener\">Multi-factor<\/a> or two factor authentication is when\u2014in addition to a username and password\u2014the user requires another way of identifying themselves. This often generates a one-time code for a smartphone app or via text message.<\/p>\n<p>The security concept behind this approach is simple. Now to get into an account you must:<\/p>\n<ol>\n<li>Know the username<\/li>\n<li>Know the password<\/li>\n<li>Have access to the device with the one-time code at the same time<\/li>\n<\/ol>\n<p>Honestly, the username is typically public knowledge. It\u2019s often someone\u2019s email or a public displayed. That leaves something you know (the password) and something you have (the device with the one-time code).<\/p>\n<p>While you can add more ways of verification, like something you are (biometrics) but <a href=\"https:\/\/www.cs.cornell.edu\/courses\/cs513\/2005fa\/NNLauthPeople.html\" target=\"_blank\" rel=\"noopener\">this approach<\/a> often strikes the right balance of usable with a good set of security practices.<\/p>\n<p><span class=\"body-subhead-title\">Building The \u201cWho\u201d<\/span><\/p>\n<p>When you are building in the cloud, you\u2019ll deal with this concept in two ways.<\/p>\n<p>The first is proving to your cloud service provider that you are who you say you are.<\/p>\n<p>For your cloud accounts, there is a strong recommendation to use multi-factor authentication. This will help to ensure that only valid users have access to you cloud resources.<\/p>\n<p>The second way you\u2019ll deal with authentication is when you\u2019re building a way for users of your solution to login. Thankfully, a lot of the heavy lifting has already been done for you.<\/p>\n<p>Each of the major cloud providers has a host of options for user authentication. This includes <a href=\"https:\/\/en.wikipedia.org\/wiki\/Single_sign-on\" target=\"_blank\" rel=\"noopener\">single sign-on<\/a> systems that will help leverage the accounts and identities you may already have access to.<\/p>\n<p><span class=\"body-subhead-title\">What Are They Allowed To Do?<\/span><\/p>\n<p>Now that you know who is making a request, the next question is \u201cWhat are they allowed to do?\u201d<\/p>\n<p>This is called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Authorization\" target=\"_blank\" rel=\"noopener\">authorization<\/a>.<\/p>\n<p>Usually, authorization expresses permissions and rights granted to a user. The single, most important concept to apply here is called the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\" target=\"_blank\" rel=\"noopener\">principle of least privilege<\/a>.<\/p>\n<p>This is the idea that you should only grant a user the permissions they require to do the task at hand and <b>no more<\/b>.<\/p>\n<p>Yes, it\u2019s just easier to give everyone administrator rights. You probably are using administrator rights on at least one system you don\u2019t have to right now.<\/p>\n<p>But this approach leads to a lot of security and privacy issues that you do not want to have to deal with. Using the principle of least privilege is a much more effective approach that leads to resilient and reliable systems.<\/p>\n<p>The good news? Each of the big three cloud service providers have a \u201cdefault deny\u201d environment in place.<\/p>\n<p>This means that by <b>default<\/b> users (and other entities) can\u2019t do anything.<\/p>\n<p>You need to explicitly grant permissions. This makes it a lot easier to follow the principle of least privilege.<\/p>\n<p><span class=\"body-subhead-title\">Managing The What<\/span><\/p>\n<p>As your environment grows, managing permissions can become a full-time job. No one wants that.<\/p>\n<p>You can apply permissions to users, roles, or other resources directly. Additionally, you can group them together in a policy and apply those policies to users, roles, and resources.<\/p>\n<p>Using policies is definitely the way to go.<\/p>\n<p>While it\u2019s tempting to just assign a required permission to the user or resource that needs them, that\u2019s a recipe for a disaster.<\/p>\n<p>Imagine that you have three people on the team who are working on a database. One of them is pushing out the latest update for your solution and runs into a permissions problem.<\/p>\n<p>The solution? They need an additional permission to the database.<\/p>\n<p>Now you could assign that directly to that team member\u2019s account but what about the other two people who work on the database? They will need this permission as well.<\/p>\n<p>This is where a policy comes into play. Assigning the permissions to the policy and that policy to anyone who needs to accomplish that task is much more efficient.<\/p>\n<p>In this example, we should assign all three team members the \u201cDatabase workers\u201d policy and that policy assigns the required permissions. Any changes in the permissions will update the policy. This automatically grants the permissions to the three team members assigned to that policy.<\/p>\n<p>This extra abstraction makes managing permissions a lot easier\u2026and yes, users and resources can have more than one policy applied.<\/p>\n<p><span class=\"body-subhead-title\">What\u2019s Next?<\/span><\/p>\n<p>There are other move advanced concepts around authentication (who you are) and authorization (what you are allowed to do) but this post covers the foundations.<\/p>\n<p>Remember two critical takeaways;<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Use multi-factor authentication whenever possible<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Apply the least numbers of permissions to a policy<\/span><\/li>\n<\/ul>\n<p>These two simple guidelines will reduce most of the headaches associated with authentication and authorization as your solution grows. This is yet another example of how applying strong security principles early in the development and design of your solution will save you work and headaches down the road.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/22\/d\/cybersecurity-basics.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With most security incidents caused by exposed secrets in DevOps pipelines and tools, proper authentication and authorization is essential. Explore the basics of strong identity management to build more resilient apps. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46177,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9530,9501,9507],"class_list":["post-46176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-best-practices","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-multi-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Basics: Authentication and Authorization 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Basics: Authentication and Authorization 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-13T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/d\/cybersecurity-basics-app-authentication-authorization\/tn-cyber-authentication.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybersecurity Basics: Authentication and Authorization\",\"datePublished\":\"2022-04-13T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cybersecurity-basics-authentication-and-authorization.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : Best Practices\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : Multi Cloud\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/\",\"name\":\"Cybersecurity Basics: Authentication and Authorization 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cybersecurity-basics-authentication-and-authorization.jpg\",\"datePublished\":\"2022-04-13T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cybersecurity-basics-authentication-and-authorization.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cybersecurity-basics-authentication-and-authorization.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-basics-authentication-and-authorization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Basics: Authentication and Authorization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Basics: Authentication and Authorization 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Basics: Authentication and Authorization 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-13T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/d\/cybersecurity-basics-app-authentication-authorization\/tn-cyber-authentication.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybersecurity Basics: Authentication and Authorization","datePublished":"2022-04-13T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/"},"wordCount":935,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cybersecurity-basics-authentication-and-authorization.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : Best Practices","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : Multi Cloud"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/","url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/","name":"Cybersecurity Basics: Authentication and Authorization 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cybersecurity-basics-authentication-and-authorization.jpg","datePublished":"2022-04-13T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cybersecurity-basics-authentication-and-authorization.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cybersecurity-basics-authentication-and-authorization.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-basics-authentication-and-authorization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Basics: Authentication and Authorization"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46176"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46176\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46177"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}