-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New Authorization Patterns Cheat Sheet #1809
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
@jmanico, @mackowski, @szh: I'm not sure how to proceed with the next two parts - Decision Dimensions for Authorization Patterns and Practical Considerations & Recommendations. The first outlines and discusses the aspects, required to be considered while selecting a proper authorization patterns for a given context. The second combines these into the actual decision framework and concludes the blog post series with recommendations and examples. What are your thoughts on that? Should I simply file both as separate cheat sheet PRs and we try to move the contents accordingly afterwards? The very first part of the series - Core Concepts is also not yet included, but actually required to better understand the topic. I referred to it again and again, especially from the last two parts of the series. |
There are some markdown errors to resolve: cheatsheets_draft/Authorization_Patterns_Cheat_Sheet.md:71 MD012/no-multiple-blanks Multiple consecutive blank lines [Expected: 1; Actual: 2] |
cc @mackowski @szh |
This is a bit out of my league to review. The one comment I'll say is that it feels a bit jargon-filled. I would like for it to be more approachable. But perhaps that's simply the nature of the topic? |
I think you feedback is right on. I can do a more careful review later this week. |
resolved :) |
Since the identity propagation patterns cheat sheet is merged, the broken link mentioned in the description of this PR is now fixed. |
Please make sure that for your contribution:
[TEXT](URL)
This PR is a continuation of the work started with #1746 and #1808 and includes the content from my Authorization Patterns blog post with info boxes and the introduction part removed.
The first section references the authentication patterns and identity propagation patterns cheat sheets. Since the last one is not yet merged, there is a broken link right now.