Peculiarities of user identification and authorization in cloud providers based on Microsoft Azure Cloud
DOI: 10.31673/2409-7292.2023.020008
DOI:
https://doi.org/10.31673/2409-7292.2023.020008Abstract
This article considers the introduction of authorization and authentication based on cloud providers, due to the growth of their popularity among businesses and companies. An analysis of existing solutions based on various cloud providers was carried out. The existing disadvantages and advantages of each of the solutions were identified and the best solution among the possible existing solutions was determined. The authentication and authorization processes in Amazon Web Services based on Microsoft Azure Cloud were studied.
Keywords: information system, cyber security, cloud technologies, security threats, theft, ddos, security of web applications, authorization, authentication, resource management.
References
1. Azure Services Platform. Windows Azure, Windows .Net Services (2016 р.) https://victana.lviv.ua/knyhy/konspekty-lektsii/133-kros-platformenne-prohramuvannia-ta-khmarni-servisy/552-lektsiia-4-azure-services-platform-windows-azure-windows-net-services-2016-r
2. Stephen J. Bigelow. Microsoft Azure. https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure
3. What Is Microsoft (MS) Azure Cloud? Cloud Compute 101. https://www.perforce.com/blog/vcs/whatmicrosoft-azure-cloud
4. Nicola Wright. Everything you ever wanted to know about Microsoft Azure. https://www.nigelfrank.com/insights/everything-you-ever-wanted-to-know-about-microsoft-azure