Tag

Permission Management

0 views collected around this technical thread.

IT Xianyu
IT Xianyu
Apr 24, 2025 · Databases

PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening

This tutorial explains why DBAs need security hardening and log analysis, shows how to configure minimal‑privilege roles and precise permissions in PostgreSQL, demonstrates how to detect and revoke redundant privileges, and provides a step‑by‑step guide to installing and using pgBadger for log analysis and automated reporting.

DBALog AnalysisPermission Management
0 likes · 8 min read
PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

Access ControlAuthorizationPermission Management
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
Top Architect
Top Architect
Aug 13, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including standard RBAC, role inheritance, constraints, user groups, organizations, and positions, and provides detailed database table designs for implementing an ideal RBAC system in complex enterprises.

Access ControlPermission ManagementRBAC
0 likes · 20 min read
Understanding Permission Management and RBAC Models
DataFunTalk
DataFunTalk
Jul 24, 2024 · Product Management

From 1 to N: Building and Optimizing a Tag System – Common Issues and Solutions

This article examines the essential steps and challenges of scaling a tag system from its initial stage to a mature N‑scale solution, offering practical guidance on functional development, business system integration, permission management, tag architecture, service processes, and evaluation of tag value.

Permission ManagementTag Systemdata analysis
0 likes · 5 min read
From 1 to N: Building and Optimizing a Tag System – Common Issues and Solutions
Architect's Guide
Architect's Guide
May 6, 2024 · Information Security

Designing Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including basic RBAC, role inheritance, constrained RBAC, and how to combine them with user groups, organizations, and positions, and provides database table designs for both standard and ideal RBAC implementations.

Access ControlDatabase DesignPermission Management
0 likes · 15 min read
Designing Permission Management and RBAC Models
Selected Java Interview Questions
Selected Java Interview Questions
Apr 2, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including classic RBAC, role inheritance, constrained RBAC, and discusses practical extensions such as user groups, organizations, positions, and provides database schema designs for both standard and ideal RBAC implementations.

Access ControlAuthorizationPermission Management
0 likes · 19 min read
Understanding Permission Management and RBAC Models
Top Architect
Top Architect
Mar 12, 2024 · Information Security

Why Permission Management Is Needed and How to Design RBAC Models

The article explains the necessity of strict permission management in enterprises, introduces various permission models such as basic RBAC, role‑inheritance RBAC and constrained RBAC, and provides detailed table designs and best‑practice recommendations for implementing scalable and secure access control systems.

Access ControlPermission ManagementRBAC
0 likes · 22 min read
Why Permission Management Is Needed and How to Design RBAC Models
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 25, 2023 · Frontend Development

Comprehensive Guide to Building a Vue3 + Vite + TypeScript Project with Permission Management, Component Encapsulation, and Build Optimization

This article presents a step‑by‑step tutorial for creating a Vue 3 project using Vite and TypeScript, covering project scaffolding, routing and permission control, reusable component and directive encapsulation, custom hooks, Axios configuration, build optimization techniques, and essential TypeScript concepts.

Component EncapsulationFrontend DevelopmentPermission Management
0 likes · 19 min read
Comprehensive Guide to Building a Vue3 + Vite + TypeScript Project with Permission Management, Component Encapsulation, and Build Optimization
Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLAccess ControlBackend Development
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Architect
Architect
Sep 4, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article details the design and development of a unified permission management service (MPS) that consolidates RBAC, ACL, and DAC models to solve fragmented enterprise permission issues, covering requirement analysis, technical selection, functional modules, deployment, and performance outcomes.

ACLAccess ControlDAC
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
High Availability Architecture
High Availability Architecture
Aug 28, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article presents a comprehensive design and development of Baidu's Unified Permission Management Service (MPS), detailing its requirement analysis, technical selection, hybrid RBAC/ACL/DAC model, functional modules, implementation specifics, and operational results that demonstrate its effectiveness in consolidating enterprise-wide access control.

ACLAccess ControlBackend Service
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
Bilibili Tech
Bilibili Tech
Aug 15, 2023 · Backend Development

Bilibili Customer Service System Architecture and Implementation

The article explains Bilibili's self‑developed customer‑service platform, describing its modular architecture, core workflows, and implementation of features such as intelligent QA with Faiss vector search, Redis‑based seat scheduling, a robust workstation, permission control, and exploration of large language models, highlighting improvements in interception rate, satisfaction, and handling time.

Backend DevelopmentCustomer Service SystemFaiss vector search
0 likes · 20 min read
Bilibili Customer Service System Architecture and Implementation
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLAccess ControlBackend Development
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
php中文网 Courses
php中文网 Courses
Jul 12, 2023 · Mobile Development

Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature

This article explains how to adapt mobile apps to the latest Ministry of Industry and Information Technology network entry rules by covering basic mode design, personal data protection, permission request practices, update notifications, and signature authenticity, while also listing example implementations from popular apps.

Permission Managementapp updatemobile app
0 likes · 6 min read
Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature
Bilibili Tech
Bilibili Tech
Mar 10, 2023 · Information Security

Data Security Construction in Berserker Platform

The article outlines Berserker’s comprehensive data‑security framework—built on the CIA triad and 5A methodology—that unifies authentication, authorization, access control, asset protection, and auditing across Hive, Kafka, ClickHouse and ETL tasks, describes the migration from version 1.0 to 2.0 with a redesigned permission system, workspaces, Casbin performance tweaks, and previews future fine‑grained, lifecycle‑wide security enhancements.

Access ControlAuthorizationBerserker platform
0 likes · 15 min read
Data Security Construction in Berserker Platform
Java Architect Essentials
Java Architect Essentials
Oct 8, 2022 · Backend Development

Spring Boot Security Permission Management Tutorial with Role and Menu Implementation

This article provides a step‑by‑step guide to building a Spring Boot permission management system using Spring Security, Spring Data JPA, Thymeleaf and Bootstrap, covering database design, entity classes, Maven setup, security configuration, dynamic menu loading, front‑end rendering and testing with full source code examples.

JavaPermission ManagementRole-Based Access Control
0 likes · 19 min read
Spring Boot Security Permission Management Tutorial with Role and Menu Implementation
Top Architect
Top Architect
Aug 28, 2022 · Information Security

Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures

This article explains why permission management is essential for data security, introduces various permission models including basic RBAC, role inheritance, constrained RBAC, and discusses user grouping, organization‑based roles, and detailed database schema designs for both standard and ideal RBAC systems.

Access ControlPermission ManagementRBAC
0 likes · 16 min read
Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures
Java Architect Essentials
Java Architect Essentials
Jul 20, 2022 · Information Security

Spring Security Based System Permission Management Tutorial

This article provides a comprehensive step‑by‑step guide on building a permission management system with Spring Security, covering database design, entity classes, Maven configuration, security configuration, dynamic menu loading, front‑end rendering using Thymeleaf, and complete testing with sample code and screenshots.

AuthorizationJavaPermission Management
0 likes · 19 min read
Spring Security Based System Permission Management Tutorial
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 13, 2022 · Information Security

Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models

This article introduces the problems of the legacy permission approach at Zhuanzhuan, compares industry‑standard RBAC and ABAC models, explains the design rationale for a hybrid RBAC‑based system, and outlines the core modules, role hierarchy, and permission types for the new unified permission management platform.

ABACAccess ControlAuthorization
0 likes · 15 min read
Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models
Architect
Architect
May 16, 2022 · Databases

Understanding MySQL Execution Process and SQL Execution Order

This article explains the complete MySQL execution pipeline—from client connection, authentication, and permission checks through caching, parsing, optimization, and execution—plus the logical order of SQL clauses, illustrated with diagrams to help developers optimize and comprehend database queries.

MySQLPermission ManagementQuery Optimization
0 likes · 12 min read
Understanding MySQL Execution Process and SQL Execution Order