There are two terms namely “authentication” and “authorization” and people are often curious and confused between the two. Yes, of course they are related to security and in today’s world of distributed computing, cloud computing and Service Oriented architecture, these two necessitate and coupled with each other to provide a secure access to the resources. … Continue reading Authentication and Authorization : 2 to tango