chapter twelve

12 Authorization context

 

This chapter covers

  • the three-dimensional choice space for context: which signals, how they’re delivered, and how fresh they are
  • How PIPs collect signals and PDPs assemble entities for policy evaluation
  • Signal delivery models: tokens, queries, and hybrids using device-posture tokens at request time
  • Managing freshness, caching, and revocation to balance assurance and performance
  • Securing and normalizing signals using provenance, signatures, and an enterprise PIP with a Shared Signal Framework-style eventing system

Policies alone aren’t enough to make authorization decisions—they need context to turn abstract rules into concrete outcomes. Whether a request should be allowed depends on not only who asks and what they want but also a surrounding set of facts: Is the device compliant? Is the employee still active? Is the login risky? Is the customer’s account suspended? These trust signals provide the raw material for policies to work. Without them, even the most elegant policy language is useless.

Every authorization system must answer three questions about signals:

  • Which signals matter? (employment status, device trust, MFA, geolocation, risk score, account balance)
  • How should those signals be delivered? (embedded in tokens, fetched from APIs, pushed from event streams, gathered by local agents)
  • How fresh do they need to be? (queried live, cached briefly, or embedded until token expiry)

12.1 Policy Information Points (PIPs)

12.2 Entities: principals and resources

12.3 Signals and their delivery

12.3.1 What the signals are

12.3.2 How signals are delivered

12.3.3 ACME’s delivery choices

12.4 Freshness, caching, and revocation

12.4.1 The freshness spectrum

12.4.2 Caching strategies

12.4.3 Revocation and signal updates

12.4.4 ACME’s approach to freshness

12.5 Transmission and integrity of signals

12.5.1 How signals move

12.5.2 Protecting signals in transit

12.5.3 Limiting signal scope

12.6 Authorization context normalization

12.6.1 The normalization layer

12.6.2 Benefits of normalization

12.6.3 Extending SSF inside the organization

12.6.4 The broader lesson

12.7 Putting it all together

12.8 Summary