# Authorization
###### tags: `Research` `Authorization` `Proxy` `Go` `Plando`
Before do anything with authentication, we need to tackle the authorization problem.
## Documents
- [IAM Security](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/security-iam.html)
- [Security using iam policy](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/security-iam.html)
- [Security in cloud native environment](https://www.infoworld.com/article/3203265/security-in-a-cloud-native-environment.html)
- [Api proxy vs Api Gateway](https://stoplight.io/blog/api-proxy-vs-api-gateway-c008c942a02d/)
- [Api proxy patterns](https://sawtooth.hyperledger.org/docs/core/nightly/1-1/sysadmin_guide/rest_auth_proxy.html)
- [Kong api gateway](https://konghq.com/solutions/gateway/)
- [Choose api gateway](https://www.moesif.com/blog/technical/api-gateways/How-to-Choose-The-Right-API-Gateway-For-Your-Platform-Comparison-Of-Kong-Tyk-Apigee-And-Alternatives/)
## Videos
- [Example: Small Cloud Native Authentication](https://www.youtube.com/watch?v=io7qOlmGJX4)
## Examples
- [Micro proxy using go](https://github.com/KensoDev/micro-auth-proxy)