The process of determining what actions or resources an authenticated user or system is permitted to access.
Authorisation (or authorization) determines what an authenticated entity is allowed to do. After confirming identity (authentication), authorisation checks permissions to specific resources or actions.
Authorisation models:
Common patterns:
Implementation:
Proper authorisation ensures users can only access what they need, protecting sensitive data and meeting compliance requirements like principle of least privilege.
We implement authorisation for Australian business AI systems, ensuring appropriate access controls for different user roles and data sensitivity levels.
"Implementing role-based access where admins can train models, analysts can view results, and basic users can only query the AI."