Navigating authentication and authorization

CerbosCerbos
2 min read

Originally published by Alex Olivier on the Cerbos Blog — June 25, 2024

Understanding and implementing efficient authentication and authorization mechanisms are crucial in building secure and scalable applications, which is why we’re excited to share the second part of our three-part series created in collaboration with Microsoft. This piece simplifies these complex processes, providing a guide for developers and software engineers on integrating Microsoft Entra External ID with Cerbos for robust authentication and fine-grained authorization in applications. By following the tutorial presented, your applications will not only be secure, but also comply with best practices in user management and access control.

Read the first blog of the series to understand the critical roles of authentication and authorization in safeguarding data and ensuring system security across various software applications.

Here’s what we cover

Setup and configuration: We guide you through setting up an External ID tenant and registering your application within Microsoft Entra, making it ready to handle authentication.

User flow and permissions: Share details on how to create user flows for sign-in and sign-up processes, and how to manage permissions effectively to secure your application.

Implementing Cerbos for authorization: Examine how to define and enforce authorization policies that dynamically control access to resources based on user roles and conditions.

Practical integration: Through code samples and a step-by-step tutorial, we illustrate how to implement Microsoft Entra External ID and Cerbos in a sample web application, empowering you to replicate these strategies in your own projects.

Looking ahead

In the upcoming third blog, we will delve deeper into the advanced capabilities and features of External ID and Cerbos. Expect to explore sophisticated scenarios for managing SaaS users and enhancing security postures further. This next piece will be invaluable for those looking to elevate their app security to the next level. Stay tuned for the next part of this series!

Stay connected

For those eager to explore Cerbos and its capabilities further, we invite you to try out Cerbos Hub and book a meeting for a more detailed discussion by clicking the buttons below. For a comprehensive exploration of the topics discussed and more insights into authentication and authorization, make sure to read the full article on Microsoft's blog.

0
Subscribe to my newsletter

Read articles from Cerbos directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Cerbos
Cerbos

Cerbos is a self-hosted, open source authorization layer that separates your authorization logic from your core application code. Cerbos makes authorization more scalable, more secure and easier to change as an application evolves.