The Good Tech Companies - How SaaS Companies are Changing Their Approach to Authorization

Episode Date: April 27, 2025

This story was originally published on HackerNoon at: https://hackernoon.com/how-saas-companies-are-changing-their-approach-to-authorization. SaaS companies are shifting... to authorization-as-a-service, enabling secure, flexible access control and protecting LLMs from data exposure. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #authorization-as-a-service, #saas-authorization, #rbac-rebac-abac, #secure-llm-chatbots, #access-control-systems, #application-security, #permission-management, #good-company, and more. This story was written by: @jonstojanjournalist. Learn more about this writer by checking @jonstojanjournalist's about page, and for more stories, please visit hackernoon.com. SaaS companies are moving away from hardcoded authorization, embracing tools like Oso to manage RBAC, ReBAC, ABAC, and secure LLM chatbots. As data access grows more complex, authorization-as-a-service offers scalable, fine-grained control to prevent leaks and streamline app development.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. How SaaS companies are changing their approach to authorization, by John Stoyan Journalist. Authorization is a critical, yet invisible, part of most applications. Authorization defines who has access to which data. Using a physical security analogy, if authentication is about who can enter the front door, authorizationize about who has keys to which rooms. Historically, development teams built authorization logic into their application code. But building and maintaining authorization logic has become mind-numbing work, and over time, no one wants to touch the code in fear of giving the wrong person access to sensitive information.
Starting point is 00:00:41 This issue is amplified by the explosion of LLM chatbots, which need to train using a lot of data, not all of which should be exposed to the end user. Recently a new crop of developer tools has emerged to address this critical component of software development. Like Twilio has done for SMS or Stripe for payments, vendors like Oso aim to solve authorization so that developers can focus on their core app. Types of Authorization There are several common authorization patterns. Typically, organizations start with Role-Based Authorization or RBAC, where users have defined roles that determine the data that they can access.
Starting point is 00:01:18 Using Google Docs as an example, a given document might have an editor, commenter, or viewer. Sounds simple, right? Let's extend the Google Docs example. Let's say a user creates an entire folder of documents. If you have viewer access to the folder, you should have viewer access to all of the underlying documents. Now we need to implement relationship-based access control, or rebac, which means that not only do you need roles, but you also need to organize
Starting point is 00:01:45 permissions based on the relationship between resources. You then may want to introduce further requirements, such as defining public VS private documents, time-bound access, this person can have editor access to the document until close of business, or conditional access, sensitive HR documents cannot be accessed, even if your role would allow it otherwise. This type of authorization is called attribute-based authorization, securing LLM chatbots. In addition to these traditional authorization patterns, the explosion of LLM chatbots introduces new ways to interact with data, as well as new challenges. The flexibility and scale of LLMs make it harder to ensure that you don't leak sensitive data.
Starting point is 00:02:25 In order to be accurate, these models need to train on a large corpus of data. When returning answers, however, it's imperative that only end-users only see the data that they're supposed to see. For example, imagine an employee asking an internal chatbot, please summarize the outcomes of the executive staff meeting for the last six months. Below is an example of the data flow for an authorized RAG chatbot, which incorporates permission checks prior to returning an answer to the end user. Who is using authorization as a service? New vendors offering authorization as a service enable companies to deliver fine-grained access controls,
Starting point is 00:03:00 such as Role-Based Access Control, RBAC, Relationship-Bbased access control, RBC, relationship-based access control, REBAC, and attribute-based access control, ABAC, as well as emerging use cases to secure LLM chatbots. An increasing number of organizations are now using authorization as a service to secure their applications. Will your organization be next? Thank you for listening to this Hacker Noon story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.