Interview kitsBlog

Your dream job? Lets Git IT.
Interactive technical interview preparation platform designed for modern developers.

XGitHub

Platform

  • Categories

Resources

  • Blog
  • About the app
  • FAQ
  • Feedback

Legal

  • Privacy Policy
  • Terms of Service

© 2026 LetsGit.IT. All rights reserved.

LetsGit.IT/Categories/Architecture
Architectureeasy

Authentication vs authorization — what’s the difference?

Tags
#auth#authentication#authorization#security
Back to categoryPractice quiz

Answer

Authentication answers “who are you?” (prove identity). Authorization answers “what are you allowed to do?” (permissions) after you’re authenticated.

Advanced answer

Deep dive

Expanding on the short answer — what usually matters in practice:

  • Context (tags): auth, authentication, authorization, security
  • Scaling: what scales horizontally vs vertically, where bottlenecks appear.
  • Reliability: retries/circuit breakers/idempotency, observability (logs/metrics/traces).
  • Evolution: keep changes cheap (boundaries, contracts, tests).
  • Explain the "why", not just the "what" (intuition + consequences).
  • Trade-offs: what you gain/lose (time, memory, complexity, risk).
  • Edge cases: empty inputs, large inputs, invalid inputs, concurrency.

Examples

A tiny example (an explanation template):

// Example: discuss trade-offs for "authentication-vs-authorization-—-what’s-the-dif"
function explain() {
  // Start from the core idea:
  // Authentication answers “who are you?” (prove identity). Authorization answers “what are yo
}

Common pitfalls

  • Too generic: no concrete trade-offs or examples.
  • Mixing average-case and worst-case (e.g., complexity).
  • Ignoring constraints: memory, concurrency, network/disk costs.

Interview follow-ups

  • When would you choose an alternative and why?
  • What production issues show up and how do you diagnose them?
  • How would you test edge cases?

Related questions

Architecture
CORS: what is it and what does it NOT protect you from?
#architecture#web#cors
Security
JWT pitfalls: when should you use JWTs vs server-side sessions?
#jwt#sessions#auth
Security
How should passwords be stored securely?
#passwords
#hashing
#security
Security
Authentication vs authorization — what’s the difference, with examples?
#authn#authz#security
Security
What is threat modeling, and how do you run a lightweight threat model for a feature?
#threat-modeling#risk#security
DevOps
What are best practices for secure and small Docker images?
#docker#containers#security