Most databases worth mentioning include authentication and authorization capabilities.
However, devils emerge in the details when edge cases of these capabilities are investigated.
We'll see that popular databases (e.g. MySQL, PostgreSQL, Cassandra, MongoDB …) can have unexpected and sometimes unintended auth behavior.
This includes a fresh authentication vulnerability.
Ideal auth behaviors, with regard to security, will be reviewed.
Then we'll demo how popular databases stack up against them.
Attendees will walk away knowing which auth properties to look for when including a database in their tech stack.