Back to Security Pattern Catalog
: Core Security, Information Disclosure
Authorization policies have to enforced.
How can the authorization policies be enforced to prevent the users and processes from performing illegal actions ?
Define a process that intercepts all requests for resources and validates access on them.
Operating systems like Windows 2000, Solaris 9, AIX. Java Security Manager.
Policy Enforcement Point
Policy, Access Control
Last modified: May 05, 2012
and Maintained by: Munawar Hafiz