Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

When applications protect resources by checking if the authenticated user is in a group, they are implicitly making essentially using a group as if it were a role from the group.  For example, if the application code checks if the authenticated user is in the institution's "student" group, in order for them to see the main screen of the application, then there is an implicit hard-coded privilege resource of "main-screen", and action "view", assigned to the role "studentUser", which is assigned to the group "student".  Though it is referred to as security by group, it is actually a role.

...