# Authorization ###### tags: `Research` `Authorization` `Proxy` `Go` `Plando` Before do anything with authentication, we need to tackle the authorization problem. ## Documents - [IAM Security](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/security-iam.html) - [Security using iam policy](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/security-iam.html) - [Security in cloud native environment](https://www.infoworld.com/article/3203265/security-in-a-cloud-native-environment.html) - [Api proxy vs Api Gateway](https://stoplight.io/blog/api-proxy-vs-api-gateway-c008c942a02d/) - [Api proxy patterns](https://sawtooth.hyperledger.org/docs/core/nightly/1-1/sysadmin_guide/rest_auth_proxy.html) - [Kong api gateway](https://konghq.com/solutions/gateway/) - [Choose api gateway](https://www.moesif.com/blog/technical/api-gateways/How-to-Choose-The-Right-API-Gateway-For-Your-Platform-Comparison-Of-Kong-Tyk-Apigee-And-Alternatives/) ## Videos - [Example: Small Cloud Native Authentication](https://www.youtube.com/watch?v=io7qOlmGJX4) ## Examples - [Micro proxy using go](https://github.com/KensoDev/micro-auth-proxy)