introduction
What is Broken Object Level Authorization?
Two main types of Broken Object Level Authorization
Based on user ID
Based on object ID
Example of an attack
How to Detect and Prevent Broken Object Level Authorization
Conclusion