Tag

RBAC

1 views collected around this technical thread.

Code Mala Tang
Code Mala Tang
May 1, 2025 · Backend Development

Master Advanced FastAPI Routing: Modular APIs, Versioning, and RBAC

This tutorial explains how to build scalable, maintainable FastAPI APIs by modularizing routers, implementing path‑based version control, centralizing dependency injection, applying role‑based access control, using custom middleware, and nesting routers for complex applications.

API designRBACVersioning
0 likes · 10 min read
Master Advanced FastAPI Routing: Modular APIs, Versioning, and RBAC
Selected Java Interview Questions
Selected Java Interview Questions
Apr 15, 2025 · Backend Development

Design and Implementation of Data Permission in Backend Projects Using MyBatis Interceptor and Spring Boot Auto‑Configuration

This article explains a low‑intrusion data‑permission design for backend micro‑services, detailing resource and value‑rule definitions, RBAC modeling, MyBatis SQL interception implementation, Redis‑based permission retrieval, and Spring Boot auto‑configuration for easy enablement in production.

Backend DevelopmentData PermissionMyBatis
0 likes · 9 min read
Design and Implementation of Data Permission in Backend Projects Using MyBatis Interceptor and Spring Boot Auto‑Configuration
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAccess ControlAuthorization
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Python Programming Learning Circle
Python Programming Learning Circle
Mar 17, 2025 · Cloud Native

Automating Kubernetes Tasks with the Python Client Library

This tutorial demonstrates how to set up a local KinD cluster, configure authentication, use raw curl commands, and employ the official Kubernetes Python client to list pods, create deployments, watch events, and manage RBAC, providing a complete guide for automating Kubernetes operations with Python.

APIDevOpsKubernetes
0 likes · 11 min read
Automating Kubernetes Tasks with the Python Client Library
Linux Ops Smart Journey
Linux Ops Smart Journey
Feb 25, 2025 · Cloud Native

How to Retrieve ServiceAccount Tokens in Kubernetes 1.24+ Without Legacy Secrets

Starting with Kubernetes 1.24, automatic ServiceAccount token Secrets are deprecated; this guide explains the core changes, shows how to manually create token Secrets, extract tokens, and verify permissions using command‑line, API calls, and RBAC inspection, plus common troubleshooting steps.

KubernetesRBACServiceAccount
0 likes · 5 min read
How to Retrieve ServiceAccount Tokens in Kubernetes 1.24+ Without Legacy Secrets
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

Access ControlAuthorizationPermission Management
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
37 Interactive Technology Team
37 Interactive Technology Team
Nov 27, 2024 · Cloud Native

Kubernetes RBAC Permission Authentication: Concepts, Components, and Production Scenarios

Kubernetes RBAC authenticates users and programs by verifying who can perform which verbs on which resources, using ServiceAccounts, Roles, RoleBindings, ClusterRoles and ClusterRoleBindings, and the article demonstrates these concepts through production scenarios such as a TCF framework pod communication setup and full‑admin access via token‑based kubeconfig.

AuthorizationKubernetesRBAC
0 likes · 8 min read
Kubernetes RBAC Permission Authentication: Concepts, Components, and Production Scenarios
Top Architect
Top Architect
Nov 27, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure RBAC permissions in Spring Security, and provides step‑by‑step Java code for integrating JWT authentication, password encryption, and custom login filters for secure backend development.

Backend DevelopmentJWTJava
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
Top Architect
Top Architect
Nov 23, 2024 · Backend Development

RBAC Permission Analysis and Spring Security Tutorial with JWT Integration

This comprehensive tutorial explains RBAC concepts and models, demonstrates basic Spring Security setup, shows how to integrate JWT for stateless authentication, covers JSON‑based login, password encryption with BCrypt, and database‑backed authentication, providing full code examples for each step.

AuthenticationJWTJava
0 likes · 16 min read
RBAC Permission Analysis and Spring Security Tutorial with JWT Integration
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 18, 2024 · Frontend Development

Implementing Page and Button Permission Control in Vue.js Using RBAC

This article explains how to build a Vue.js admin interface with role‑based access control, covering ACL vs. RBAC concepts, dynamic route generation, layout composition, Pinia state management, custom permission directives for page and button visibility, and alternative v‑if based checks.

Element-PlusPiniaRBAC
0 likes · 13 min read
Implementing Page and Button Permission Control in Vue.js Using RBAC
Top Architect
Top Architect
Aug 25, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the concepts of role‑based access control (RBAC), compares RBAC models, shows how to configure permissions and user groups, and provides step‑by‑step code examples for integrating Spring Security with JWT, JSON login, password encryption and database authentication in Java backend applications.

Access ControlBackend DevelopmentJWT
0 likes · 20 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Top Architect
Top Architect
Aug 13, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including standard RBAC, role inheritance, constraints, user groups, organizations, and positions, and provides detailed database table designs for implementing an ideal RBAC system in complex enterprises.

Access ControlPermission ManagementRBAC
0 likes · 20 min read
Understanding Permission Management and RBAC Models
Top Architect
Top Architect
Jul 30, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure Spring Security for in‑memory and JWT‑based authentication, and provides complete Java code examples for permissions, user groups, password encryption, and custom login filters.

Access ControlAuthenticationJWT
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
macrozheng
macrozheng
Jul 4, 2024 · Information Security

Mastering Access Control: 5 Core Permission Models and Practical RBAC Design

This article explains the fundamentals of access control by reviewing five major permission models—ACL, DAC, MAC, ABAC, and RBAC—then dives into RBAC extensions and practical guidelines for designing user, role, and permission management in real‑world systems, covering menu, operation, and data-level controls.

Access ControlAuthorizationRBAC
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models and Practical RBAC Design
Top Architect
Top Architect
Jun 12, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model classifications, permission concepts, and user‑group usage, then demonstrates how to implement RBAC in a Spring Security application, including in‑memory authentication, JWT integration, JSON login, and password encryption techniques.

Access ControlAuthenticationJWT
0 likes · 17 min read
Understanding RBAC and Implementing Spring Security with JWT
Architect's Guide
Architect's Guide
May 19, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the fundamentals of role‑based access control (RBAC), its model variants, and user‑group usage, then demonstrates how to configure Spring Security with in‑memory authentication, integrate JWT for stateless token‑based authentication, customize JSON login, and securely encrypt passwords using BCrypt.

Access ControlAuthenticationJWT
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureComplianceEncryption
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
Architect's Guide
Architect's Guide
May 6, 2024 · Information Security

Designing Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including basic RBAC, role inheritance, constrained RBAC, and how to combine them with user groups, organizations, and positions, and provides database table designs for both standard and ideal RBAC implementations.

Access ControlDatabase DesignPermission Management
0 likes · 15 min read
Designing Permission Management and RBAC Models