Authorization
Authorization is the process of determining whether a person or system is allowed to access a specific resource, file, or service. It typically occurs after authentication (verifying identity) and decides what actions a user is permitted to perform. For example, authorization controls whether a logged-in user can view, edit, or delete particular data within an application.
Authorization is the security mechanism by which a system evaluates and enforces access policies to determine whether an authenticated principal (user, service, or entity) has the requisite permissions to access a given resource or perform a specific operation. It is distinct from authentication, which establishes identity, and from encryption, which protects data confidentiality. In application security, authorization logic must be robust, aligned with the application's business context, and maintainable. Authorization decisions are typically driven by policies that map users or roles to permitted actions on digital assets. Implementation approaches include role-based access control (RBAC), attribute-based access control (ABAC), and policy-based models. Authorization flaws, such as insecure direct object references or privilege escalation, are common vulnerability classes that static analysis tools may partially detect at the code level, though comprehensive validation of authorization logic typically requires runtime context and business-rule awareness.
Why it matters
Authorization is a foundational element of application security because it governs what authenticated users and services can actually do within a system. Even when authentication is implemented correctly, flawed authorization logic can allow users to access resources belonging to other users, escalate their privileges, or perform actions outside their intended scope. Vulnerability classes such as insecure direct object references (IDOR) and privilege escalation are consistently ranked among the most common and impactful application security weaknesses. Because authorization decisions are deeply tied to business logic, they are difficult to validate through automated means alone, making them a persistent source of risk.
The consequences of authorization failures can be severe. When authorization controls are bypassed, attackers may gain access to sensitive data, modify records they should not be able to touch, or assume administrative capabilities. Real-world incidents involving broken access control have led to large-scale data exposures across industries. The difficulty of detecting these flaws before deployment, combined with the fact that authorization logic must be maintained and updated as applications evolve, means that organizations must treat authorization as an ongoing concern rather than a one-time implementation task.
Who it's relevant to
Inside Authorization
Common questions
Answers to the questions practitioners most commonly ask about Authorization.