{"id":13527,"date":"2024-01-10T20:18:31","date_gmt":"2024-01-10T20:18:31","guid":{"rendered":"https:\/\/movielabs.com\/?p=13527"},"modified":"2024-01-10T20:18:40","modified_gmt":"2024-01-10T20:18:40","slug":"am-i-authorized-to-do-that","status":"publish","type":"post","link":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/","title":{"rendered":"Am I Authorized to Do That?"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.19.4″ custom_padding=”||0px||false|false” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row custom_padding_last_edited=”on|desktop” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding_tablet=”||30px||false|false” custom_padding_phone=”||30px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text module_class=”bullet-list” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]<\/p>\n

CSAP (the Common Security Architecture for Production<\/a>) is a workflow driven Zero Trust security architecture designed for production workflows.<\/p>\n

This is the third blog in our zero trust series, and in the first two we have explored the concept of trust and what it means in a zero trust architecture. The first two blogs are:<\/p>\n

    \n
  1. Can I trust you?<\/a><\/li>\n
  2. I don\u2019t trust you, you don\u2019t trust me, now what?<\/a><\/li>\n<\/ol>\n

    The subtitle of our third blog is \u201cWhy CSAP separates authentication and authorization\u201d and the reason is because that is how zero-trust works! So, end of blog.<\/p>\n

    No, not really.<\/p>\n

    Let\u2019s discuss why zero trust separates authentication and authorization.<\/p>\n

    To paraphrase a statement in the NIST zero trust architecture document, the goal of zero trust is to prevent unauthorized access to data and services coupled with making the access control enforcement as granular as possible. That means, authorized and authenticated entities (user, application, service, and device) can access the resources to the exclusion of all other entities (i.e., unauthenticated or unauthorized, which includes attackers). NIST SP 800-207, Zero Trust Architecture, goes on to say:<\/p>\n

    [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.19.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.19.4″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_image src=”https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/NIST_SP_800-207_zero_trust_architecture.jpg” alt=”NIST SP 800-207″ title_text=”NIST SP 800-207″ show_bottom_space=”off” _builder_version=”4.19.4″ _module_preset=”default” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset2″ box_shadow_horizontal=”4px” box_shadow_vertical=”4px” box_shadow_blur=”12px” box_shadow_color=”rgba(0,0,0,0.16)” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=”on|desktop” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding_tablet=”||30px||false|false” custom_padding_phone=”||30px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text module_class=”bullet-list” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]<\/p>\n

    So separating authentication and authorization isn\u2019t something we made up for CSAP; it\u2019s fundamental to zero trust.<\/p>\n

    Let\u2019s break that down. Clearly\u2013and we discussed this in depth in the first blog in this series\u2013you cannot trust anything that hasn\u2019t been authenticated.<\/p>\n

    [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.19.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.19.4″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_image src=”https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/tea.jpg” alt=”NIST SP 800-207″ title_text=”NIST SP 800-207″ show_bottom_space=”off” _builder_version=”4.19.4″ _module_preset=”default” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset2″ box_shadow_horizontal=”4px” box_shadow_vertical=”4px” box_shadow_blur=”12px” box_shadow_color=”rgba(0,0,0,0.16)” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=”on|desktop” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding_tablet=”||30px||false|false” custom_padding_phone=”||30px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text module_class=”bullet-list” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]We love explaining security in parables. Here\u2019s one for you: you live in a city, you\u2019re alone in your home, and you just made yourself a cup of tea. The doorbell rings, and you open the front door to find three people in utility company overalls, who say you\u2019ve got a problem with your gas supply. You hadn\u2019t noticed anything because you just boiled water on the stove to make tea. Do you let them in? The short answer is \u201cno!!!\u201d. In fact, it\u2019s difficult to think of a city where it was OK to open the door to start with! Letting them in, or even opening the front door, is implied trust. And if you let them in, you\u2019re authorizing them to do anything they want in your home because there are three of them and one of you. <\/p>\n

    So, let\u2019s deal with authentication first. You must check their ID and call the utility company to see if they are employees, why they were sent to your house and what the problem is that they came to fix. If you\u2019re happy that they are real, it still doesn\u2019t mean you should let them come in, and until you do, they\u2019ve been authenticated but not authorized. <\/p>\n

    In our scenario, even if the utility company believes there is something wrong with your gas supply it can\u2019t be in your home because you can\u2019t smell gas and your stove works. Obviously, if you could smell gas, you wouldn\u2019t have lit your stove. So that means you only need to give them access your gas meter which, as is the case in many suburban areas in United States, is attached to the outside of your home. You authorize them to enter the area beside your home where the gas meter is, but no more than that. You\u2019ve let them inside the protect surface for your lawnmower but not the protect surface for your home.<\/p>\n

    However, let\u2019s back up to the fresh cup of tea and the ringing doorbell. You look at your doorbell camera and recognize (i.e., authenticate) a close friend. [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.19.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.19.4″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_image src=”https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/ringing_doorbell.jpg” alt=”NIST SP 800-207″ title_text=”NIST SP 800-207″ show_bottom_space=”off” _builder_version=”4.19.4″ _module_preset=”default” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset2″ box_shadow_horizontal=”4px” box_shadow_vertical=”4px” box_shadow_blur=”12px” box_shadow_color=”rgba(0,0,0,0.16)” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=”off|desktop” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”||0px||false|false” custom_padding_tablet=”||30px||false|false” custom_padding_phone=”||30px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text module_class=”bullet-list” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]<\/p>\n

    You let them in (i.e., authorize them to enter). In both cases (assuming the three people that visited you earlier were utility company employees), you have authenticated whoever is at the door, but your authorization only extends as far as is necessary or appropriate.<\/p>\n

    One more before we go back to cybersecurity. Let\u2019s suppose you\u2019ve been in bed for a week with a bad case of flu and your home is, quite reasonably in the circumstances, a mess and not the normal no-clutter environment you like to live in. Another friend arrives unannounced to visit. It\u2019s someone you\u2019d normally invite in, but in the circumstances, you explain through the intercom that you\u2019re not up for visitors. What does this show? While you\u2019d welcome this friend into your home (i.e., authorize entry) at one time, at another time you don\u2019t want to (i.e., not authorize entry).<\/p>\n

    This illustrates something about managing authentication and authorization in a system: authentication is relatively static, whereas in dynamic environments such as film and TV production, it\u2019s vital to be able to quickly and easily change who is authorized to do something. The NIST zero trust architecture uses the term \u201cdynamic security policies\u201d and CSAP uses the term \u201cauthorization policies\u201d.<\/p>\n

    Take this one step further. Security policies are created to serve current needs for authorization. In CSAP, one source of that need is workflow management. That\u2019s a different place than where identity is managed. The latter being an organization function, and normally it only changes during onboarding and off-boarding.<\/p>\n

    So, we hope you now understand why authentication and authorization are separated.<\/p>\n

    This is a functional or logical separation. It doesn\u2019t necessarily mean there needs to be two distinct system.<\/p>\n

    For example, an identity and access management system (IAM) is in use that manages both user identity and user roles, and there is a storage pool with role based access management (RBAC) where access is controlled according the role assigned to a user. Workflow management wants an assistant editor to ingest a new set of dailies. It generates a request to grant (authorize) access to that assistant editor.<\/p>\n

    Without changing the IAM system or the access management method of the storage pool, or adding a new system, the assistant editor can be authorized to access the dailies in two ways:<\/p>\n

      \n
    1. The RBAC for the dailies is changed to include a role already assigned to the assistant editor by the IAM system.<\/li>\n
    2. A new role, one that already has access to the dailies, is assigned to the assistant editor.<\/li>\n<\/ol>\n

      [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.19.4″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.19.4″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_image src=”https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/auth_sys_editor.png” alt=”NIST SP 800-207″ title_text=”NIST SP 800-207″ show_bottom_space=”off” _builder_version=”4.19.4″ _module_preset=”default” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset2″ box_shadow_horizontal=”4px” box_shadow_vertical=”4px” box_shadow_blur=”12px” box_shadow_color=”rgba(0,0,0,0.16)” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=”on|desktop” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding_tablet=”||30px||false|false” custom_padding_phone=”||30px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text module_class=”bullet-list” _builder_version=”4.19.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]<\/p>\n

      The authorization service, which is simply acting on behalf of the workflow management, is using one of the two options to create a match between a role the user has and a role that can access the dailies.<\/p>\n

      Job done. And now back to that Cup of Tea\u2026<\/p>\n

      [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

      Why CSAP separates authentication and authorization<\/p>\n","protected":false},"author":13,"featured_media":13535,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"\u00a0\r\n\r\nTo assist the industry in easily picking up and using the Visual Language for Media Creation we have created templates for major workflow design applications and services.\u00a0 In April 2023 we introduced support for Apple Keynote, Omnigraggle (for Mac) and Autodesk Autocad (for Windows and Mac).\u00a0 All of these templates including the basic shapes (representing Assets, Infrastructure, Tasks, Participants and Contexts) as well as the Icons, lines and arrowheads.\u00a0 We also include some recommendations and samples.\u00a0 We'll keep these templates updated as the Visual Language continues to expand.\r\n\r\nBelow is a summary of the new and existing templates available now on the Visual Language page.\u00a0 More detailed information and notes for developers looking to integrate visual language into their apps\/services are available on our documentation site at https:\/\/mc.movielabs.com\/docs\/visual-language\/.\r\n\r\nIn addition we have also translated the MovieLabs assets into native Autocad DWG format to allow them to be used in location and set planning workflows.<\/span>\r\n\r\n\u00a0\r\n

      NEW Apple \"Keynote\" for Mac\/iOS<\/span><\/b>\u00a0<\/span><\/h3>\r\n\"\"\r\n\r\nFor Keynote, we have imported and organized all the shapes, icons, and lines so you can copy and paste them into your presentation. We have included several slides about the language, included some examples and provided slides with all the icons with their terms.\u00a0<\/span>\u00a0<\/span>\r\n\r\n\u00a0\r\n\r\n\u00a0<\/span>\r\n\r\n\u00a0<\/span>\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n

      NEW - OmniGroup \"Omnigraffle\" for Mac<\/span><\/b><\/h3>\r\n\u00a0<\/span>\"\"\r\n\r\nFor Omnigraffle, we have imported and organized all of the shapes so they are ready to be used natively within the application or shared within your facility. You can easily copy, connect, or format the shapes and connect them via native lines and shapes. We have created a sample document.\u00a0<\/span>\u00a0<\/span>\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n

      NEW - Autodesk \"A<\/span><\/b>utoCAD\"<\/span><\/b>\u00a0<\/span><\/h3>\r\n\u00a0<\/span>For Autocad, we have created a library of DWG shapes of each shape, icon, and line so they can be used natively in the application for location and set design workflows.\u00a0<\/span>\u00a0<\/span>\r\n

      \u00a0Microsoft \"PowerPoint\" and \"Visio\"<\/strong><\/h3>\r\n\"\"\r\n\r\nThe existing templates have been updated to v1.2\u00a0 with more examples and the latest icons.\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\n\u00a0\r\n\r\nTo download all of the assets and templates above click here<\/a>.\r\n\r\n\u00a0\r\n

      Lucid Software's \"LucidChart\"<\/strong><\/h3>\r\nIn addition, we can shar ethe MovieLabs library of icons and asset shapes for the LucidChart online SaaS service.\u00a0 To request access to the template email us at lucid@movielabs.com so we can share permissions.<\/span>\r\n

      Contact Us<\/strong><\/h3>\r\n\u00a0We love to know what's you're using the Visual Language for and if you have specific feedback or requested extra features or icons!\u00a0 Please email us at office@movielabs.<\/span>\r\n\r\n\u00a0\r\n\r\n\u00a0<\/span>","_et_gb_content_width":"","_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[78,84],"tags":[],"ppma_author":[53],"acf":[],"yoast_head":"\nAm I Authorized to Do That? - MovieLabs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Am I Authorized to Do That? - MovieLabs\" \/>\n<meta property=\"og:description\" content=\"Why CSAP separates authentication and authorization\" \/>\n<meta property=\"og:url\" content=\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/\" \/>\n<meta property=\"og:site_name\" content=\"MovieLabs\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-10T20:18:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-10T20:18:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1079\" \/>\n\t<meta property=\"og:image:height\" content=\"573\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Spencer Stephens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spencer Stephens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/\",\"url\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/\",\"name\":\"Am I Authorized to Do That? - MovieLabs\",\"isPartOf\":{\"@id\":\"https:\/\/movielabs.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg\",\"datePublished\":\"2024-01-10T20:18:31+00:00\",\"dateModified\":\"2024-01-10T20:18:40+00:00\",\"author\":{\"@id\":\"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#primaryimage\",\"url\":\"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg\",\"contentUrl\":\"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg\",\"width\":1079,\"height\":573},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/movielabs.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Am I Authorized to Do That?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/movielabs.com\/#website\",\"url\":\"https:\/\/movielabs.com\/\",\"name\":\"MovieLabs\",\"description\":\"Driving Innovation in Film and TV Content Creation and Distribution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/movielabs.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02\",\"name\":\"Spencer Stephens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/movielabs.com\/#\/schema\/person\/image\/dbaadc6be039c0e195c1efccd7340614\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g\",\"caption\":\"Spencer Stephens\"},\"url\":\"https:\/\/movielabs.com\/author\/sstephens\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Am I Authorized to Do That? - MovieLabs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/","og_locale":"en_US","og_type":"article","og_title":"Am I Authorized to Do That? - MovieLabs","og_description":"Why CSAP separates authentication and authorization","og_url":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/","og_site_name":"MovieLabs","article_published_time":"2024-01-10T20:18:31+00:00","article_modified_time":"2024-01-10T20:18:40+00:00","og_image":[{"width":1079,"height":573,"url":"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg","type":"image\/jpeg"}],"author":"Spencer Stephens","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spencer Stephens","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/","url":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/","name":"Am I Authorized to Do That? - MovieLabs","isPartOf":{"@id":"https:\/\/movielabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#primaryimage"},"image":{"@id":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#primaryimage"},"thumbnailUrl":"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg","datePublished":"2024-01-10T20:18:31+00:00","dateModified":"2024-01-10T20:18:40+00:00","author":{"@id":"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02"},"breadcrumb":{"@id":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/movielabs.com\/am-i-authorized-to-do-that\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#primaryimage","url":"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg","contentUrl":"https:\/\/movielabs.com\/wp-content\/uploads\/2024\/01\/am_I_authorized_to_do_that.jpg","width":1079,"height":573},{"@type":"BreadcrumbList","@id":"https:\/\/movielabs.com\/am-i-authorized-to-do-that\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/movielabs.com\/"},{"@type":"ListItem","position":2,"name":"Am I Authorized to Do That?"}]},{"@type":"WebSite","@id":"https:\/\/movielabs.com\/#website","url":"https:\/\/movielabs.com\/","name":"MovieLabs","description":"Driving Innovation in Film and TV Content Creation and Distribution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/movielabs.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02","name":"Spencer Stephens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/movielabs.com\/#\/schema\/person\/image\/dbaadc6be039c0e195c1efccd7340614","url":"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g","caption":"Spencer Stephens"},"url":"https:\/\/movielabs.com\/author\/sstephens\/"}]}},"authors":[{"term_id":53,"user_id":13,"is_guest":0,"slug":"sstephens","display_name":"Spencer Stephens","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g","user_url":"","last_name":"Stephens","first_name":"Spencer","job_title":"","description":""}],"_links":{"self":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts\/13527"}],"collection":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/comments?post=13527"}],"version-history":[{"count":8,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts\/13527\/revisions"}],"predecessor-version":[{"id":13542,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts\/13527\/revisions\/13542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/media\/13535"}],"wp:attachment":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/media?parent=13527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/categories?post=13527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/tags?post=13527"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/ppma_author?post=13527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}