5 Comments
User's avatar
ARUN MUTKULE's avatar

Thanks for sharing its really helpful

Expand full comment
Alex's avatar

Amazing information thank you!!😊

Expand full comment
Sukhrob Abdullaev's avatar

Vaw that is amazing , thanks for sharing

Expand full comment
Willem van Heemstra's avatar

Hi @Hayk! Will you also cover Policy-Based Access Control (PBAC)?

Expand full comment
Hugo Guerrero's avatar

Awesome post!

One key component to implement Authtorization could be an FGA (Fine Grained Access) like Zanzibar, user by Google👍🏽

Would be great a post of it

Expand full comment