{"version":"1.0","provider_name":"CloudThat Resources","provider_url":"https:\/\/www.cloudthat.com\/resources","author_name":"Ritushree Dutta","author_url":"https:\/\/www.cloudthat.com\/resources\/author\/ritushree-dutta\/","title":"Authorization Mechanisms in Web Applications","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RmXGDoD2dt\"><a href=\"https:\/\/www.cloudthat.com\/resources\/blog\/authorization-mechanisms-in-web-applications\">Authorization Mechanisms in Web Applications<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cloudthat.com\/resources\/blog\/authorization-mechanisms-in-web-applications\/embed\/#?secret=RmXGDoD2dt\" width=\"600\" height=\"338\" title=\"&#8220;Authorization Mechanisms in Web Applications&#8221; &#8212; CloudThat Resources\" data-secret=\"RmXGDoD2dt\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2023\/10\/Authorization-Mechanisms-in-Web-Applications.webp","thumbnail_width":890,"thumbnail_height":471,"description":"In the ever-evolving landscape of web applications, security is of paramount importance. After successfully authenticating users, web applications must ensure that these users can only access the resources and perform actions appropriate for their roles and privileges."}