1
0
mirror of https://github.com/kamranahmedse/developer-roadmap.git synced 2025-01-17 22:28:32 +01:00

Update resources for Authentication (#7745)

* Update authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md

replaced a wrong article with one about biometrics

* Update understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md

link redirects to a Thai gambling game site
This commit is contained in:
b4haa7 2024-11-24 05:07:02 +02:00 committed by GitHub
parent 39d64df330
commit 9b1848d504
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 2 additions and 3 deletions

View File

@ -5,7 +5,7 @@
**Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application.
- [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/)
- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5428991/)
- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://me-en.kaspersky.com/resource-center/definitions/biometrics)
- [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php)
- [@article@Role-based access control (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control)
- [@article@Access Control Lists (ACLs)](https://en.wikipedia.org/wiki/Access-control_list)

View File

@ -6,5 +6,4 @@ Learn more from the following resources:
- [@official@Metasploit Framework](https://www.metasploit.com/)
- [@official@Core Impact](https://www.coresecurity.com/)
- [@official@Immunity Canvas](www.immunitysec.com)
- [@video@Metasploit for Beginners](https://www.youtube.com/watch?v=8lR27r8Y_ik)
- [@video@Metasploit for Beginners](https://www.youtube.com/watch?v=8lR27r8Y_ik)