Patent attributes
An example computing platform may be configured to (i) receive a request to access one or more resources on behalf of a given user, (ii) identify a parameter within the request that requires a permission verification, (iii) apply a verification tag to the parameter, wherein the verification tag is set to a first value indicating that a permission verification has not been successfully performed for the given user with respect to the parameter, (iv) perform a permission verification for the given user with respect to the parameter, (v) based on performing the permission verification, either (a) update the verification tag from the first value to a second value indicating that a permission verification has been successfully performed or (b) leave the verification tag set to the first value, and (vi) determine whether to grant or deny the request based at least in part on the verification tag for the parameter.