Skip to content

Client Authentication #21

@djfurman

Description

@djfurman

Note that this epic relates only to practices identifying that the end client (user/system) is whom it claims to be, not whether it may or may not take an action. This is the difference between authentication (the former) and authorization (the latter).

As a business critical function, the system must be able to reliably determine that a calling client is whom they claim to be. The authentication method must

  • appeal to a source of authority, which no FACET-Acq system is regarding individual or system identity
  • provide revokability to compromised or access-terminated identities
  • stateless
  • secure
  • non-intrusive

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions