Exemplifying the user authentication and access control
In this section, we will show several examples of the user authentication and access control field. These examples include OAuth2.0, SELinux, and face recognition.
OAuth2.0 and user authentication
OAuth 2.0 is an open standard for authorization that allows third-party services to exchange web resources on behalf of a user. It’s important to clarify that OAuth 2.0 is primarily about authorization, not authentication. Authorization is the process of specifying access rights to resources, which is different from authentication, the process of verifying identity. OAuth 2.0 provides delegated access to server resources on behalf of the resource owner. It establishes a process through which users are redirected to a service provider to authenticate and then return to the original website with an authorization code that can be exchanged for an access token. This token grants specific types of access to specific resources...