ABAC - How is the PIP authenticated and authorized?

41 Views Asked by At

What authentication method is commonly used for the PIP (e.g. certificate, login and password)?

Is the access of the PIP also authorized by the ABAC? I would assume that in most cases the PIP authorization doesn't require other attributes besides the request parameters and should be resolved without the need for recursive calls. Are there cases that r

0

There are 0 best solutions below