Tag

permission

0 views collected around this technical thread.

Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Mar 14, 2025 · Frontend Development

Using Bitwise Operations for Efficient Permission Management in Frontend Development

This article explores how bitwise operators can replace verbose boolean checks for permission handling, drawing examples from React Fiber, Vue3 virtual DOM, and common algorithmic problems, and provides a step‑by‑step guide to building a compact, high‑performance permission system in JavaScript.

JavaScriptReactVue
0 likes · 11 min read
Using Bitwise Operations for Efficient Permission Management in Frontend Development
Selected Java Interview Questions
Selected Java Interview Questions
Dec 25, 2024 · Backend Development

Integrating jCasbin Permission Management into Spring Boot Applications

This article explains how to replace Shiro with jCasbin for permission management in Spring Boot, covering Maven dependency setup, configuration files, Enforcer initialization, custom policy handling, and a simple servlet filter for runtime authorization checks.

AuthorizationJavaSpring Boot
0 likes · 10 min read
Integrating jCasbin Permission Management into Spring Boot Applications
Selected Java Interview Questions
Selected Java Interview Questions
Nov 27, 2024 · Backend Development

Designing a Flexible Permission Control System with Java Annotations and Spring AOP

This article explains how to build a scalable, maintainable permission control framework in Java by defining custom annotations, designing relational database tables, and using Spring AOP to intercept method calls for organization‑level, personal, limit, and special‑role checks, while providing implementation details and best‑practice recommendations.

AOPAccess ControlAnnotations
0 likes · 21 min read
Designing a Flexible Permission Control System with Java Annotations and Spring AOP
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 24, 2024 · Backend Development

Master Fine-Grained Permission Control in Spring Boot 3 with JWT and SpEL

This article demonstrates how to implement fine‑grained permission checks in Spring Boot 3 without using Spring Security, by creating custom HandlerInterceptors, JWT utilities, DAO and service layers, and integrating SpEL expressions for dynamic authorization, complete with code snippets and test results.

Backend DevelopmentHandlerInterceptorJWT
0 likes · 13 min read
Master Fine-Grained Permission Control in Spring Boot 3 with JWT and SpEL
Java Captain
Java Captain
Oct 17, 2024 · Backend Development

Reducing CRUD Boilerplate with APIJSON: One Interface for All Operations

This article explains how APIJSON lets developers replace dozens of SpringBoot CRUD endpoints with a single, configurable interface for GET, POST, PUT, DELETE and HEAD requests, dramatically cutting code lines while supporting complex queries, pagination, joins and role‑based permissions.

APIJSONCRUDJSON
0 likes · 7 min read
Reducing CRUD Boilerplate with APIJSON: One Interface for All Operations
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 18, 2024 · Frontend Development

Implementing Page and Button Permission Control in Vue.js Using RBAC

This article explains how to build a Vue.js admin interface with role‑based access control, covering ACL vs. RBAC concepts, dynamic route generation, layout composition, Pinia state management, custom permission directives for page and button visibility, and alternative v‑if based checks.

Element-PlusPiniaRBAC
0 likes · 13 min read
Implementing Page and Button Permission Control in Vue.js Using RBAC
Java Architect Essentials
Java Architect Essentials
Jun 30, 2024 · Backend Development

Integrating jCasbin Permission Management into Spring Boot Applications

This article demonstrates how to add jCasbin to a Spring Boot project, covering Maven dependencies, configuration files, Enforcer initialization, custom policy objects, a servlet filter for authorization, and dynamic add‑remove permission APIs, enabling lightweight, database‑driven access control.

AuthorizationJavaSpring Boot
0 likes · 10 min read
Integrating jCasbin Permission Management into Spring Boot Applications
Top Architect
Top Architect
Jan 26, 2024 · Backend Development

Using Spring Expression Language (SpEL) for Flexible Permission Control in Spring Boot

This article demonstrates how to integrate Spring Expression Language (SpEL) with custom annotations and AOP in Spring Boot to create a highly flexible, maintainable permission‑checking mechanism that can handle various complex access scenarios without scattering hard‑coded logic throughout the codebase.

AspectCustom AnnotationJava
0 likes · 11 min read
Using Spring Expression Language (SpEL) for Flexible Permission Control in Spring Boot
Code Ape Tech Column
Code Ape Tech Column
Jan 26, 2024 · Backend Development

Implementing Flexible Permission Control in Spring Boot Using Custom Annotations and SpEL

This article demonstrates how to create a customizable permission‑checking mechanism in Spring Boot by defining a @PreAuth annotation, an AOP aspect, and leveraging Spring Expression Language (SpEL) to express complex access rules such as role, time, and permission constraints.

AOPCustom AnnotationJava
0 likes · 10 min read
Implementing Flexible Permission Control in Spring Boot Using Custom Annotations and SpEL
IT Services Circle
IT Services Circle
Jan 12, 2024 · Operations

How to Fix DingTalk 7.5 Windows Permission Errors by Restoring Registry Permissions

This article explains why DingTalk 7.5 corrupts Windows registry permissions, causing Explorer and system component errors, and provides both the official repair tool link and a step‑by‑step manual method to restore the Users read permission in the registry.

RegistryTroubleshootingdingtalk
0 likes · 6 min read
How to Fix DingTalk 7.5 Windows Permission Errors by Restoring Registry Permissions
Beike Product & Technology
Beike Product & Technology
Jan 12, 2024 · Information Security

Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System

This article examines how misconfigured Kubernetes RBAC permissions can lead to privilege escalation across clusters, presents a graph‑based model to represent users, roles, and authorities, and provides code examples and Cypher queries for detecting and visualizing high‑risk permission paths.

KubernetesRBACSecurity
0 likes · 16 min read
Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System
DeWu Technology
DeWu Technology
Dec 6, 2023 · Frontend Development

Permission Design for Front-end Monorepo in Large-Scale Development

The article presents a practical permission‑management strategy for a large‑scale front‑end monorepo that merges Git‑hook validation with GitLab’s protected branches and role‑based access, defines a clear directory hierarchy, outlines workflow controls, and explores extensions such as fine‑grained ACLs and file‑access logging to prevent unauthorized file changes.

Access ControlCode ReviewGitLab
0 likes · 17 min read
Permission Design for Front-end Monorepo in Large-Scale Development
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Nov 27, 2023 · Backend Development

Secure Spring Boot APIs with AOP and Spring Security: A Step‑by‑Step Guide

This article explains how to combine Spring AOP and Spring Security in a Spring Boot 2.7.12 application to implement permission verification, covering concepts, required dependencies, custom filters, annotations, aspect logic, global exception handling, test endpoints, JWT token handling, and extensions for SpEL‑based role checks.

AOPJWTSpring Boot
0 likes · 11 min read
Secure Spring Boot APIs with AOP and Spring Security: A Step‑by‑Step Guide
Aikesheng Open Source Community
Aikesheng Open Source Community
Aug 15, 2023 · Databases

Root Cause Analysis of MySQL Replication Error 1590 Caused by INCIDENT_EVENT During Partial Permission Changes

The article analyzes a MySQL 5.7 replication failure where the slave SQL thread stops with error 1590 because the master writes an INCIDENT_EVENT to the binlog when a GRANT or CREATE USER statement partially succeeds due to password‑validation plugin constraints, leading to replication breakage.

DatabaseIncident EventMySQL
0 likes · 11 min read
Root Cause Analysis of MySQL Replication Error 1590 Caused by INCIDENT_EVENT During Partial Permission Changes
macrozheng
macrozheng
Jun 15, 2023 · Backend Development

How to Build a Reusable Backend Permission System with Spring Security

This article walks through the complete design and implementation of a reusable permission module for a Java e‑commerce backend, covering functional design, database schema, API contracts, and key technical points such as Spring Security, JWT authentication, and Redis‑based performance optimizations.

API designDatabase DesignJWT
0 likes · 8 min read
How to Build a Reusable Backend Permission System with Spring Security
Java Architect Essentials
Java Architect Essentials
May 13, 2023 · Information Security

Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration

This article introduces the lightweight Sa-Token Java framework, explains its login and permission authentication mechanisms, demonstrates essential API usage with code examples, and provides step‑by‑step integration guides for SpringBoot and WebFlux, covering configuration, session handling, role checks, wildcard permissions, and global exception handling.

AuthenticationAuthorizationJava
0 likes · 23 min read
Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration
Java Architect Essentials
Java Architect Essentials
Mar 31, 2023 · Backend Development

Integrating jCasbin Permission Management into Spring Boot Applications

This article explains how backend developers can replace Shiro with jCasbin for permission management in Spring Boot projects, covering Maven dependencies, configuration files, property loading, Enforcer initialization, custom policy objects, request filtering, and dynamic policy updates.

AuthorizationJavaSpring Boot
0 likes · 10 min read
Integrating jCasbin Permission Management into Spring Boot Applications
Selected Java Interview Questions
Selected Java Interview Questions
Jan 16, 2023 · Backend Development

Integrating jCasbin Permission Management into Spring Boot Applications

This article introduces jCasbin as a lightweight alternative to Shiro for permission management in Spring Boot, explains Maven setup, configuration files, Enforcer initialization, policy model definition, and demonstrates how to enforce, add, and delete permissions dynamically using filters and REST endpoints.

AuthorizationJavaSpring Boot
0 likes · 9 min read
Integrating jCasbin Permission Management into Spring Boot Applications
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 16, 2022 · Frontend Development

Frontend SDK Design and Integration for a Unified Permission System

This article explains how to design a unified permission system's frontend SDK, detailing its core APIs, integration methods for standard React and Umi projects, dynamic route generation, and menu/button level permission controls, accompanied by practical code examples.

Dynamic RoutingReactSDK
0 likes · 9 min read
Frontend SDK Design and Integration for a Unified Permission System
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 8, 2022 · Databases

Fixing DBLE Docker Deployment: IP Subnet and Permission Issues

This guide walks through troubleshooting DBLE container deployment by adjusting Docker network subnets, correcting DBLE configuration IPs, and granting the necessary database permissions to ensure the logical schema is created without errors.

DBLEDatabase MiddlewareDocker
0 likes · 10 min read
Fixing DBLE Docker Deployment: IP Subnet and Permission Issues