Authorization and permission models are where authenticated identity turns into actual capability.
Authorization and permission models are where authenticated identity turns into actual capability. This chapter breaks access decisions down into their core parts, then walks through the main model families that organizations use in enterprise apps, cloud platforms, internal tools, and customer-facing products.
Read the chapter in order. The first lesson establishes the primitives of authorization: subject, action, resource, scope, and context. The second covers RBAC because it is still the most familiar model in many organizations. The third explains ABAC and why attribute quality is the hidden success factor. The fourth covers centralized policy and rule-based decisions, where hybrid models often emerge. The fifth covers resource-based permissions and delegation, which are common in document sharing, project ownership, and object-level product authorization.
Later chapters on groups, privileged access, cloud IAM, APIs, and tenant isolation all depend on the distinctions introduced here. If access control still feels like “users and roles,” Chapter 5 is where that model becomes much more precise.