Tagged articles
6 articles
Page 1 of 1
Digital Planet
Digital Planet
Apr 29, 2026 · Backend Development

Why Traditional Code‑Issuing Platforms’ Permission Design Is Doomed to Fail

The article explains how the hard‑coded, role‑bound permission model of traditional code‑issuing platforms collapses when an organization’s structure changes, and shows how a three‑layer decoupled architecture can provide fine‑grained, configurable access that turns the platform into true enterprise infrastructure.

Identity ManagementPermission DesignRole-Based Access Control
0 likes · 12 min read
Why Traditional Code‑Issuing Platforms’ Permission Design Is Doomed to Fail
Su San Talks Tech
Su San Talks Tech
Nov 13, 2025 · Information Security

Designing Scalable Permission Systems: From Basic RBAC to Advanced Role Hierarchies

This article explains why permission management is essential, outlines basic and advanced permission models—including RBAC, role inheritance, constraints, user groups, organizations, and positions—and provides detailed table designs for both standard and ideal RBAC implementations, helping developers build scalable, secure access control systems.

Database designInformation SecurityPermission Design
0 likes · 18 min read
Designing Scalable Permission Systems: From Basic RBAC to Advanced Role Hierarchies
Architect's Must-Have
Architect's Must-Have
Jun 17, 2025 · Information Security

Designing Scalable Permission Systems: From Basic RBAC to Advanced Models

This article explains why permission management is essential, outlines various permission models—including basic RBAC, role inheritance, constrained RBAC, and their extensions with user groups, organizations, and positions—and provides practical table designs for implementing a robust access‑control system.

Permission DesignRBACRole Inheritance
0 likes · 18 min read
Designing Scalable Permission Systems: From Basic RBAC to Advanced Models
21CTO
21CTO
Aug 20, 2022 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role Inheritance

This article explains why permission management is essential, outlines common permission models such as RBAC and its extensions, discusses role inheritance, constraints, user groups, organizations and positions, and presents practical database schema designs for both standard and ideal RBAC systems.

Permission DesignRBACRole Inheritance
0 likes · 16 min read
Mastering Permission Management: From Basic RBAC to Advanced Role Inheritance
Java Captain
Java Captain
Jun 21, 2019 · Information Security

Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks

This article explores the concept of permissions, distinguishes their noun and verb attributes, outlines minimal‑privilege and data‑abstraction principles, examines server‑side versus client‑side access control, discusses role‑based access control and table design, and compares common Java security frameworks.

Permission DesignRBACaccess control
0 likes · 11 min read
Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks
网易UEDC
网易UEDC
Aug 6, 2018 · Fundamentals

Mastering Permission Design: From RBAC Basics to Advanced Strategies

This article walks designers and developers through the challenges of permission design, explains the RBAC model and its extensions, and offers practical tips for splitting, configuring, and managing permissions to build robust, user‑friendly access control systems.

Permission DesignRBACRole-Based Access Control
0 likes · 13 min read
Mastering Permission Design: From RBAC Basics to Advanced Strategies