Summary
In this chapter, you learned about the concept of authorization and its role in a web application’s security. You familiarized yourself with security concerns such as authentication, authorization, system, and data constraints. You learned about the authorization model and its common designs, such as RBAC and ABAC.
You also learned about the policy object design pattern and how it can be used to decouple authorization enforcement from authorization rules. Finally, you learned about the potential performance implications related to authorization abstractions.
In the next chapter, we will talk about the notification layer of the application and discuss how to keep notification logic under control in the world beyond emails.