Externalized Dynamic Authorization in a Microservices World

Watch the webinar
Key Takeaways:
- Enforcing authorization on the response leg to incorporate characteristics of the resources being protected
- Utilizing scopes only for what they were intended: delegated consent
- Filtering data at the Policy Enforcement Point
- Deploying authorization services as a microservice