Peculiarities of user identification and authorization in cloud providers based on Microsoft Azure Cloud

DOI: 10.31673/2409-7292.2023.020008

Authors

  • А. Г. Захаржевський, (Zakharzhevsky A. H.) State University of Telecommunications, Kyiv
  • Ю. О. Даценко, (Datsenko Yu. O.) State University of Telecommunications, Kyiv
  • І. В. Куліш, (Kulish I. V.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2023.020008

Abstract

This article considers the introduction of authorization and authentication based on cloud providers, due to the growth of their popularity among businesses and companies. An analysis of existing solutions based on various cloud providers was carried out. The existing disadvantages and advantages of each of the solutions were identified and the best solution among the possible existing solutions was determined. The authentication and authorization processes in Amazon Web Services based on Microsoft Azure Cloud were studied.

Keywords: information system, cyber security, cloud technologies, security threats, theft, ddos, security of web applications, authorization, authentication, resource management.

References
1. Azure Services Platform. Windows Azure, Windows .Net Services (2016 р.) https://victana.lviv.ua/knyhy/konspekty-lektsii/133-kros-platformenne-prohramuvannia-ta-khmarni-servisy/552-lektsiia-4-azure-services-platform-windows-azure-windows-net-services-2016-r
2. Stephen J. Bigelow. Microsoft Azure. https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure
3. What Is Microsoft (MS) Azure Cloud? Cloud Compute 101. https://www.perforce.com/blog/vcs/whatmicrosoft-azure-cloud
4. Nicola Wright. Everything you ever wanted to know about Microsoft Azure. https://www.nigelfrank.com/insights/everything-you-ever-wanted-to-know-about-microsoft-azure

Published

2023-05-05

Issue

Section

Articles