Authorization

Authorization mechanisms protect functionalities from being executed by unauthorized entities.Authorization can avoid the exploitation of Telecommands, API, CLI or other command methods to modify system configuration. Backdoor installation, data manipulation, and the use of Payload and Spacecraft’s resource are limited if authorization is applied. [1]

ID: M2025
Version: 1.2
Created: 29 September 2022
Last Modified: 05 October 2022

References