Examples disclosed herein relate to request authorization and authentication. Examples include to intercept a request from a processing pipeline of a device. The device to determine whether the request is authorized and authentic. The device to generate a cancellation request if the request is not authorized or not authenticated. The device to provide the cancellation request to the processing pipeline of the device.