Question

How to securely and effectively manage a user database and provide authentication and authorisation functionality in a cloud application?

Context

In cloud context, it is important to establish user identity and also control access to system’s resources in order to protect system and resources from unauthorised or malicious users.

Solution

A proper tool should be used to define and manage the roles and access privileges of individual application users and the circumstances in which users are granted (or denied) those privileges.

Identification, Authentication and Authorisation Navigation