Tagged articles
189 articles
Page 1 of 2
IT Architects Alliance
IT Architects Alliance
Apr 9, 2026 · Information Security

Why 68% of Kubernetes Clusters Expose Cloud Credentials and How to Fix the Top 3 Risks

A recent study reveals that over two‑thirds of Kubernetes clusters contain critical misconfigurations that let attackers escape containers, steal cloud credentials, and hijack entire cloud accounts within minutes, and the article outlines the three most dangerous flaws, real‑world attack paths, and concrete mitigation steps.

Credential LeakageDefense in DepthKubernetes
0 likes · 8 min read
Why 68% of Kubernetes Clusters Expose Cloud Credentials and How to Fix the Top 3 Risks
Coder Trainee
Coder Trainee
Mar 5, 2026 · Backend Development

A Veteran Programmer’s Simple RBAC Permission System Design

This article walks through a straightforward back‑office permission system, defining permissions as resource collections, presenting a five‑table database schema, and explaining how classic Role‑Based Access Control (RBAC) simplifies permission management for multiple users.

BackendDatabase designPermission System
0 likes · 3 min read
A Veteran Programmer’s Simple RBAC Permission System Design
Ray's Galactic Tech
Ray's Galactic Tech
Jan 26, 2026 · Cloud Native

Zero‑Downtime Kubernetes Node Maintenance: Complete SOP for Adding and Removing Nodes

This guide presents a step‑by‑step SOP for safely decommissioning and provisioning Kubernetes nodes in production, covering lifecycle labeling, RBAC safeguards, draining procedures, validation checks, handling StatefulSets and local storage, automation tips, and real‑world incident examples to ensure zero downtime and data loss.

Node MaintenanceProduction OpsRBAC
0 likes · 10 min read
Zero‑Downtime Kubernetes Node Maintenance: Complete SOP for Adding and Removing Nodes
Data STUDIO
Data STUDIO
Jan 19, 2026 · Fundamentals

10 Advanced Python Decorators to Replace Repetitive if‑else Logic and Clean Up Your Code

This article introduces ten practical Python decorator patterns—covering caching, timing, retry, rate‑limiting, logging, dependency injection, class‑wide decoration, singleton, role‑based access control, and context management—each explained with concrete code examples, output snapshots, and guidance on when and how to apply them.

PythonRBACRetry
0 likes · 29 min read
10 Advanced Python Decorators to Replace Repetitive if‑else Logic and Clean Up Your Code
Ray's Galactic Tech
Ray's Galactic Tech
Jan 13, 2026 · Cloud Native

Why Short‑Lived Tokens Are the Key to True Kubernetes Security

This article explains how ServiceAccount, Token, RBAC, and NetworkPolicy work together in Kubernetes, why short‑lived tokens with audience restrictions are essential, and provides practical manifests, version history, attack‑defense models, and cloud‑provider identity integrations for robust cloud‑native security.

RBACServiceAccountToken
0 likes · 8 min read
Why Short‑Lived Tokens Are the Key to True Kubernetes Security
Raymond Ops
Raymond Ops
Dec 29, 2025 · Information Security

Master Kubernetes Security: From RBAC to Network Policies

This guide explains why Kubernetes security is critical, presents a layered defense architecture, and provides practical steps—including RBAC least‑privilege enforcement, network‑policy zero‑trust design, Pod Security Standards, monitoring rules, and automation scripts—to harden production clusters while avoiding common pitfalls.

KubernetesNetworkPolicyPodSecurity
0 likes · 10 min read
Master Kubernetes Security: From RBAC to Network Policies
Java Architect Handbook
Java Architect Handbook
Dec 26, 2025 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models

This article explains why fine‑grained permission management is essential for data security, walks through classic RBAC, role‑inheritance (RBAC1), constrained RBAC (RBAC2), user groups, organization‑based and position‑based roles, and presents both standard and ideal database schemas for implementing these models.

Constraint ModelingRBACRole Inheritance
0 likes · 18 min read
Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models
Ray's Galactic Tech
Ray's Galactic Tech
Dec 11, 2025 · Cloud Native

Prevent Catastrophic Kubernetes Deletions with a Dual‑Layer Authorization & Validation System

This guide explains why a careless "kubectl delete" can cripple an entire production cluster and presents a practical, production‑ready dual‑layer protection strategy—RBAC‑based authorization plus a validating webhook—along with tooling, audit policies, and step‑by‑step implementation details to dramatically reduce accidental deletion risk.

RBACValidatingWebhookaudit
0 likes · 9 min read
Prevent Catastrophic Kubernetes Deletions with a Dual‑Layer Authorization & Validation System
Su San Talks Tech
Su San Talks Tech
Nov 27, 2025 · Backend Development

Four Practical Data Permission Models for Scalable Enterprise Systems

This article breaks down four common data permission implementations, comparing role‑menu binding, user‑role‑scope binding, hybrid approaches, and a menu‑dimension‑role instance design, highlighting their trade‑offs and guiding architects toward a precise, scalable solution.

RBACScalable Design
0 likes · 9 min read
Four Practical Data Permission Models for Scalable Enterprise Systems
IT Services Circle
IT Services Circle
Nov 25, 2025 · Information Security

Designing a Scalable Three‑Tier Permission Model: Functional, Data, and Approval

This article examines the evolution of digital permission architectures, explains why traditional RBAC falls short for multi‑dimensional data control, and compares four concrete data‑permission implementations before presenting a hybrid solution that avoids role explosion while delivering precise, module‑level data access.

Data PermissionRBACSoftware Architecture
0 likes · 10 min read
Designing a Scalable Three‑Tier Permission Model: Functional, Data, and Approval
Top Architect
Top Architect
Nov 17, 2025 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models

This article explains why strict permission management is essential for data security, walks through the evolution of access‑control models—from simple user‑permission tables to classic RBAC, RBAC1, RBAC2, role inheritance, constraints, user groups, organizational mapping, and finally presents ideal database schemas for scalable, maintainable permission systems.

Backend SecurityRBACRole Inheritance
0 likes · 18 min read
Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models
Su San Talks Tech
Su San Talks Tech
Nov 13, 2025 · Information Security

Designing Scalable Permission Systems: From Basic RBAC to Advanced Role Hierarchies

This article explains why permission management is essential, outlines basic and advanced permission models—including RBAC, role inheritance, constraints, user groups, organizations, and positions—and provides detailed table designs for both standard and ideal RBAC implementations, helping developers build scalable, secure access control systems.

Database designPermission DesignRBAC
0 likes · 18 min read
Designing Scalable Permission Systems: From Basic RBAC to Advanced Role Hierarchies
Raymond Ops
Raymond Ops
Nov 7, 2025 · Cloud Native

Master Kubernetes RBAC in One Article: A Complete Overview

This guide explains Kubernetes RBAC, covering authentication account types, authentication methods, authorization strategies, and detailed examples of Role, ClusterRole, RoleBinding, and ClusterRoleBinding configurations with code snippets and practical comparisons for secure cluster.

AuthorizationClusterRoleKubernetes
0 likes · 21 min read
Master Kubernetes RBAC in One Article: A Complete Overview
Cloud Native Technology Community
Cloud Native Technology Community
Oct 30, 2025 · Cloud Native

Master Kubernetes Namespaces: Isolation, Best Practices & Lifecycle Management

This article explains why Kubernetes namespaces are essential for logical isolation, outlines their core functions such as resource naming separation, RBAC scopes, quota limits and network policies, and provides practical commands, YAML examples, troubleshooting tips, and automation strategies for managing namespaces at scale.

Cloud NativeKubernetesNamespace
0 likes · 8 min read
Master Kubernetes Namespaces: Isolation, Best Practices & Lifecycle Management
Raymond Ops
Raymond Ops
Oct 20, 2025 · Information Security

Mastering Kubernetes Security: Authentication, Authorization, and Admission Control Explained

This article provides a comprehensive guide to Kubernetes security mechanisms, covering the three core layers of authentication, authorization, and admission control, various authentication methods, RBAC policies, service accounts, certificates, kubeconfig setup, and practical examples for managing access within a cluster.

AdmissionControlAuthenticationAuthorization
0 likes · 26 min read
Mastering Kubernetes Security: Authentication, Authorization, and Admission Control Explained
Raymond Ops
Raymond Ops
Oct 13, 2025 · Information Security

How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide

This comprehensive guide explains how to harden an Ubuntu‑based Kubernetes cluster with external IPs by applying system hardening, firewall rules, TLS encryption, Calico network policies, RBAC permissions, audit logging, and verification steps to achieve a multi‑layered security posture.

HardeningKubernetesRBAC
0 likes · 17 min read
How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide
Open Source Tech Hub
Open Source Tech Hub
Aug 24, 2025 · Information Security

Mastering PHP-Casbin: A Lightweight, Cross‑Framework Permission Solution

PHP‑Casbin is an open‑source, lightweight permission framework for PHP that separates policy from model, supports multiple access‑control models (ACL, RBAC, ABAC, etc.), integrates with popular frameworks via Composer, offers dynamic policy management, caching, and multi‑tenant capabilities, solving common permission pitfalls in SaaS, e‑commerce, and government systems.

ABACCasbinPHP
0 likes · 12 min read
Mastering PHP-Casbin: A Lightweight, Cross‑Framework Permission Solution
Open Source Tech Hub
Open Source Tech Hub
Aug 20, 2025 · Backend Development

Build a High‑Performance RBAC System in Webman with Casbin and ThinkORM

This guide walks PHP developers through designing a relational database schema and implementing a role‑based access control (RBAC) system in the Webman framework by integrating Casbin for policy enforcement and ThinkORM for elegant ORM handling, complete with configuration, model definitions, and middleware.

BackendCasbinPHP
0 likes · 13 min read
Build a High‑Performance RBAC System in Webman with Casbin and ThinkORM
Code Mala Tang
Code Mala Tang
Jul 24, 2025 · Information Security

Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA

This guide explains how to secure FastAPI applications using OAuth2 with JWT, role‑based access control, refresh‑token workflows, multi‑factor authentication, and integration with external providers such as Auth0, Keycloak, and Firebase.

AuthenticationFastAPIJWT
0 likes · 9 min read
Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA
Code Ape Tech Column
Code Ape Tech Column
Jul 22, 2025 · Information Security

Mastering Access Control: From ACL to RBAC and Beyond

This article explains the fundamentals and practical applications of major permission models—including ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and how to implement them effectively in real-world systems.

AuthorizationRBACaccess control
0 likes · 15 min read
Mastering Access Control: From ACL to RBAC and Beyond
Architect's Guide
Architect's Guide
Jul 18, 2025 · Information Security

Why Permission Management Matters: Designing Effective RBAC Models

This article explains why strict permission management is essential for data security, outlines various permission models—from basic data‑view and edit rights to hierarchical RBAC, RBAC1, RBAC2, role inheritance, constraints, user groups, organizations and positions—and provides guidance on designing ideal database tables for robust access control.

RBACRole Inheritanceaccess control
0 likes · 18 min read
Why Permission Management Matters: Designing Effective RBAC Models
MaGe Linux Operations
MaGe Linux Operations
Jul 9, 2025 · Cloud Native

Master Kubernetes Production Security: Essential Practices & Configurations

This guide walks operations engineers through a comprehensive, layered security model for production Kubernetes clusters, covering cluster hardening, network policies, RBAC, pod security standards, image scanning and signing, runtime monitoring, key management, compliance checks, and recommended tooling.

Container SecurityKubernetesRBAC
0 likes · 13 min read
Master Kubernetes Production Security: Essential Practices & Configurations
macrozheng
macrozheng
Jul 7, 2025 · Backend Development

Mastering RBAC with Spring Security and JWT: A Hands‑On Guide

This article walks through the fundamentals of role‑based access control (RBAC), explains RBAC model variants, demonstrates how to configure Spring Security with in‑memory, database, and JWT authentication, and shows JSON‑based login and password encryption techniques for secure backend development.

AuthenticationJWTRBAC
0 likes · 15 min read
Mastering RBAC with Spring Security and JWT: A Hands‑On Guide
IT Architects Alliance
IT Architects Alliance
Jun 25, 2025 · Information Security

Why Effective Permission Management Matters and How to Build Scalable RBAC Models

This article explains why strict permission management is essential for data security, outlines various permission models—including basic RBAC, role inheritance, and constrained RBAC—and provides practical guidance on designing tables, roles, groups, and organizational structures for scalable access control.

RBACRole Inheritanceaccess control
0 likes · 16 min read
Why Effective Permission Management Matters and How to Build Scalable RBAC Models
MaGe Linux Operations
MaGe Linux Operations
Jun 22, 2025 · Cloud Native

Master Kubernetes RBAC: Create Users, Roles, and Token Authentication Step‑by‑Step

This tutorial walks through Kubernetes permission management, showing how to configure kubeconfig on nodes, generate private keys and certificates for a new user, create namespaces, pods, roles, rolebindings, and static token authentication, and demonstrates role and clusterrole authorization with practical command examples.

ClusterRoleKubernetesRBAC
0 likes · 24 min read
Master Kubernetes RBAC: Create Users, Roles, and Token Authentication Step‑by‑Step
Architecture and Beyond
Architecture and Beyond
Jun 21, 2025 · Information Security

How Permission Control Can Make or Break Your SaaS Product (Design Tips)

Permission control is a critical, often overlooked component of SaaS products; this article explains why it matters, outlines core concepts, compares ACL, RBAC, and ABAC models, discusses SaaS-specific challenges like multi‑tenant isolation, and offers practical design, implementation, and performance‑optimization guidelines.

PermissionsRBACSaaS
0 likes · 21 min read
How Permission Control Can Make or Break Your SaaS Product (Design Tips)
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jun 18, 2025 · Cloud Native

Unifying GPU Management Across Kubernetes Clusters with RBAC & Virtual Control Planes

This article examines how to centrally manage GPU resources across heterogeneous Kubernetes clusters using namespace‑based RBAC isolation, virtual control‑plane solutions like vcluster, and multi‑cluster tools such as Karmada, comparing their architectures, use cases, advantages, and limitations to guide enterprise‑level deployment decisions.

Cloud NativeGPUKubernetes
0 likes · 14 min read
Unifying GPU Management Across Kubernetes Clusters with RBAC & Virtual Control Planes
Architect's Must-Have
Architect's Must-Have
Jun 17, 2025 · Information Security

Designing Scalable Permission Systems: From Basic RBAC to Advanced Models

This article explains why permission management is essential, outlines various permission models—including basic RBAC, role inheritance, constrained RBAC, and their extensions with user groups, organizations, and positions—and provides practical table designs for implementing a robust access‑control system.

Permission DesignRBACRole Inheritance
0 likes · 18 min read
Designing Scalable Permission Systems: From Basic RBAC to Advanced Models
Su San Talks Tech
Su San Talks Tech
Jun 17, 2025 · Backend Development

Mastering Data Permission Architectures: Four Practical Models for Scalable Systems

This article examines the evolution of permission frameworks in digital systems, explains functional, data, and approval permissions, and compares four concrete data‑permission implementations, highlighting their trade‑offs and presenting a refined model that balances role management with fine‑grained data access.

Backend ArchitectureData PermissionRBAC
0 likes · 10 min read
Mastering Data Permission Architectures: Four Practical Models for Scalable Systems
MaGe Linux Operations
MaGe Linux Operations
Jun 8, 2025 · Cloud Native

Master Kubernetes RBAC: A Complete Guide to Roles, Bindings, and Permissions

This comprehensive article explains Kubernetes security by detailing authentication types, authentication methods (HTTP Basic, Token, and HTTPS), the RBAC authorization model, and the definitions and practical examples of Role, ClusterRole, RoleBinding, and ClusterRoleBinding, helping readers implement fine‑grained access control in their clusters.

AuthenticationAuthorizationCloud Native
0 likes · 23 min read
Master Kubernetes RBAC: A Complete Guide to Roles, Bindings, and Permissions
Cloud Native Technology Community
Cloud Native Technology Community
May 22, 2025 · Information Security

How to Prevent Common Kubernetes Security Mistakes and Harden Your Cluster

This article analyzes typical Kubernetes security pitfalls—from weak authentication and overly permissive network policies to missing real‑time monitoring, exposed services, outdated versions, and default component settings—and provides concrete, layered mitigation steps and tool recommendations.

Cloud NativeKubernetesNetwork Policy
0 likes · 13 min read
How to Prevent Common Kubernetes Security Mistakes and Harden Your Cluster
MaGe Linux Operations
MaGe Linux Operations
May 15, 2025 · Cloud Native

Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control

This article explains Kubernetes' comprehensive security architecture, detailing the three critical gates—authentication, authorization, and admission control—along with token, basic, and certificate methods, RBAC policies, service accounts, kubeconfig setup, and practical examples for managing user permissions within clusters.

AdmissionControlAuthenticationAuthorization
0 likes · 20 min read
Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control
Code Mala Tang
Code Mala Tang
May 1, 2025 · Backend Development

Master Advanced FastAPI Routing: Modular APIs, Versioning, and RBAC

This tutorial explains how to build scalable, maintainable FastAPI APIs by modularizing routers, implementing path‑based version control, centralizing dependency injection, applying role‑based access control, using custom middleware, and nesting routers for complex applications.

FastAPIRBACVersioning
0 likes · 10 min read
Master Advanced FastAPI Routing: Modular APIs, Versioning, and RBAC
Selected Java Interview Questions
Selected Java Interview Questions
Apr 15, 2025 · Backend Development

Design and Implementation of Data Permission in Backend Projects Using MyBatis Interceptor and Spring Boot Auto‑Configuration

This article explains a low‑intrusion data‑permission design for backend micro‑services, detailing resource and value‑rule definitions, RBAC modeling, MyBatis SQL interception implementation, Redis‑based permission retrieval, and Spring Boot auto‑configuration for easy enablement in production.

Backend DevelopmentData PermissionMyBatis
0 likes · 9 min read
Design and Implementation of Data Permission in Backend Projects Using MyBatis Interceptor and Spring Boot Auto‑Configuration
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAuthorizationPermissions
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Python Programming Learning Circle
Python Programming Learning Circle
Mar 17, 2025 · Cloud Native

Automating Kubernetes Tasks with the Python Client Library

This tutorial demonstrates how to set up a local KinD cluster, configure authentication, use raw curl commands, and employ the official Kubernetes Python client to list pods, create deployments, watch events, and manage RBAC, providing a complete guide for automating Kubernetes operations with Python.

APIAutomationCloud Native
0 likes · 11 min read
Automating Kubernetes Tasks with the Python Client Library
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

AuthorizationRBACRole-Based Access
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
37 Interactive Technology Team
37 Interactive Technology Team
Nov 27, 2024 · Cloud Native

Kubernetes RBAC Permission Authentication: Concepts, Components, and Production Scenarios

Kubernetes RBAC authenticates users and programs by verifying who can perform which verbs on which resources, using ServiceAccounts, Roles, RoleBindings, ClusterRoles and ClusterRoleBindings, and the article demonstrates these concepts through production scenarios such as a TCF framework pod communication setup and full‑admin access via token‑based kubeconfig.

AuthorizationKubernetesRBAC
0 likes · 8 min read
Kubernetes RBAC Permission Authentication: Concepts, Components, and Production Scenarios
Top Architect
Top Architect
Nov 27, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure RBAC permissions in Spring Security, and provides step‑by‑step Java code for integrating JWT authentication, password encryption, and custom login filters for secure backend development.

Backend DevelopmentJWTJava
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
Top Architect
Top Architect
Nov 23, 2024 · Backend Development

RBAC Permission Analysis and Spring Security Tutorial with JWT Integration

This comprehensive tutorial explains RBAC concepts and models, demonstrates basic Spring Security setup, shows how to integrate JWT for stateless authentication, covers JSON‑based login, password encryption with BCrypt, and database‑backed authentication, providing full code examples for each step.

JWTJavaRBAC
0 likes · 16 min read
RBAC Permission Analysis and Spring Security Tutorial with JWT Integration
Architect
Architect
Oct 12, 2024 · Information Security

Understanding ACL, ABAC, and RBAC: Choosing the Right Access Control Model

This article introduces three common permission models—ACL, ABAC, and RBAC—explaining their core concepts, how they manage user access through objects, attributes, or roles, and discusses the strengths and limitations of each approach for secure system design.

ABACACLAuthorization
0 likes · 8 min read
Understanding ACL, ABAC, and RBAC: Choosing the Right Access Control Model
Top Architect
Top Architect
Aug 25, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the concepts of role‑based access control (RBAC), compares RBAC models, shows how to configure permissions and user groups, and provides step‑by‑step code examples for integrating Spring Security with JWT, JSON login, password encryption and database authentication in Java backend applications.

Backend DevelopmentJWTJava
0 likes · 20 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Su San Talks Tech
Su San Talks Tech
Aug 19, 2024 · Information Security

Mastering RBAC with Spring Security and JWT: A Complete Guide

This tutorial walks through RBAC fundamentals, model classifications (RBAC0‑3), permission and user‑group concepts, then demonstrates practical Spring Security setups including in‑memory authentication, JWT integration, JSON‑based login, password encryption with BCrypt, and database‑backed authentication, providing complete code examples.

AuthenticationAuthorizationJWT
0 likes · 19 min read
Mastering RBAC with Spring Security and JWT: A Complete Guide
Top Architect
Top Architect
Aug 13, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including standard RBAC, role inheritance, constraints, user groups, organizations, and positions, and provides detailed database table designs for implementing an ideal RBAC system in complex enterprises.

RBACRole InheritanceSecurity Model
0 likes · 20 min read
Understanding Permission Management and RBAC Models
Top Architect
Top Architect
Jul 30, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure Spring Security for in‑memory and JWT‑based authentication, and provides complete Java code examples for permissions, user groups, password encryption, and custom login filters.

AuthenticationJWTJava
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
macrozheng
macrozheng
Jul 4, 2024 · Information Security

Mastering Access Control: 5 Core Permission Models and Practical RBAC Design

This article explains the fundamentals of access control by reviewing five major permission models—ACL, DAC, MAC, ABAC, and RBAC—then dives into RBAC extensions and practical guidelines for designing user, role, and permission management in real‑world systems, covering menu, operation, and data-level controls.

AuthorizationRBACSecurity Architecture
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models and Practical RBAC Design
Top Architect
Top Architect
Jun 12, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model classifications, permission concepts, and user‑group usage, then demonstrates how to implement RBAC in a Spring Security application, including in‑memory authentication, JWT integration, JSON login, and password encryption techniques.

AuthenticationJWTJava
0 likes · 17 min read
Understanding RBAC and Implementing Spring Security with JWT
Su San Talks Tech
Su San Talks Tech
Jun 3, 2024 · Information Security

Mastering Access Control: 5 Core Permission Models Explained

This article introduces the five mainstream access‑control models—ACL, DAC, MAC, ABAC, and RBAC—explaining their principles, real‑world examples, drawbacks, and how RBAC can be extended and applied in practical user, role, and permission management systems.

AuthorizationRBACSecurity
0 likes · 14 min read
Mastering Access Control: 5 Core Permission Models Explained
Architect's Guide
Architect's Guide
May 19, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the fundamentals of role‑based access control (RBAC), its model variants, and user‑group usage, then demonstrates how to configure Spring Security with in‑memory authentication, integrate JWT for stateless token‑based authentication, customize JSON login, and securely encrypt passwords using BCrypt.

AuthenticationBackendJWT
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureMicrosoft Dynamics 365RBAC
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
Architect's Guide
Architect's Guide
May 6, 2024 · Information Security

Designing Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including basic RBAC, role inheritance, constrained RBAC, and how to combine them with user groups, organizations, and positions, and provides database table designs for both standard and ideal RBAC implementations.

Database designRBACRole Inheritance
0 likes · 15 min read
Designing Permission Management and RBAC Models
Alibaba Cloud Native
Alibaba Cloud Native
Apr 19, 2024 · Information Security

Securing Nacos with Zero‑Trust: TLS, Encryption, and Access Control

This article explains how to protect Nacos configuration data by applying zero‑trust principles, covering transport encryption with TLS, storage encryption using plugins, and fine‑grained access control through authentication and RBAC, while providing practical configuration steps.

Configuration SecurityNacosRBAC
0 likes · 18 min read
Securing Nacos with Zero‑Trust: TLS, Encryption, and Access Control
Java Architect Essentials
Java Architect Essentials
Apr 10, 2024 · Information Security

Implementing JWT‑Based Authentication and RBAC with Spring Security in a Spring Boot Application

This article demonstrates how to integrate JWT token authentication and role‑based access control (RBAC) into a Spring Boot backend using Spring Security, covering model classification, dependency setup, user details implementation, token utilities, filters, configuration, and login handling with code examples.

Backend DevelopmentJavaRBAC
0 likes · 15 min read
Implementing JWT‑Based Authentication and RBAC with Spring Security in a Spring Boot Application
Selected Java Interview Questions
Selected Java Interview Questions
Apr 2, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including classic RBAC, role inheritance, constrained RBAC, and discusses practical extensions such as user groups, organizations, positions, and provides database schema designs for both standard and ideal RBAC implementations.

AuthorizationRBACRole-Based Access Control
0 likes · 19 min read
Understanding Permission Management and RBAC Models
Architect
Architect
Mar 20, 2024 · Information Security

RBAC Permission Analysis and Spring Security JWT Integration Tutorial

This tutorial explains RBAC concepts and model classifications, demonstrates permission and user‑group management, and provides step‑by‑step guidance for implementing Spring Security with in‑memory authentication, JWT integration, JSON login, password encryption, and database authentication using Java code examples.

JWTJavaPassword Encryption
0 likes · 18 min read
RBAC Permission Analysis and Spring Security JWT Integration Tutorial
Top Architect
Top Architect
Mar 12, 2024 · Information Security

Why Permission Management Is Needed and How to Design RBAC Models

The article explains the necessity of strict permission management in enterprises, introduces various permission models such as basic RBAC, role‑inheritance RBAC and constrained RBAC, and provides detailed table designs and best‑practice recommendations for implementing scalable and secure access control systems.

RBACRole-Based Access Controlaccess control
0 likes · 22 min read
Why Permission Management Is Needed and How to Design RBAC Models
Beike Product & Technology
Beike Product & Technology
Jan 29, 2024 · Information Security

Kubernetes Security Risks and Hardening Recommendations

This article analyzes Kubernetes security threats from cloud, cluster, and container perspectives, enumerates high‑risk permissions, default privileged accounts, and insecure configurations, and provides concrete hardening steps such as least‑privilege RAM policies, etcd encryption, RBAC tightening, and workload isolation measures.

CloudNativeKubernetesPodSecurity
0 likes · 31 min read
Kubernetes Security Risks and Hardening Recommendations
政采云技术
政采云技术
Jan 23, 2024 · Big Data

Design and Implementation of a Big Data Permission Management System

This article outlines the background, importance, scenarios, challenges, objectives, and architectural design—including RBAC and ABAC models, metadata integration, data classification, and verification mechanisms—of a comprehensive big data permission management system for secure and fine‑grained data access.

ABACBig DataRBAC
0 likes · 14 min read
Design and Implementation of a Big Data Permission Management System
Architect
Architect
Jan 16, 2024 · Information Security

Designing Scalable Permission Models: From Basic RBAC to Advanced Role Inheritance

The article explains why strict permission management is essential, walks through classic RBAC, role inheritance, constraint handling, user groups, organization and position mapping, and presents both standard and ideal database schemas for building maintainable access‑control systems in complex enterprises.

Database designRBACRole Inheritance
0 likes · 19 min read
Designing Scalable Permission Models: From Basic RBAC to Advanced Role Inheritance
Beike Product & Technology
Beike Product & Technology
Jan 12, 2024 · Information Security

Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System

This article examines how misconfigured Kubernetes RBAC permissions can lead to privilege escalation across clusters, presents a graph‑based model to represent users, roles, and authorities, and provides code examples and Cypher queries for detecting and visualizing high‑risk permission paths.

KubernetesRBACSecurity
0 likes · 16 min read
Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Dec 23, 2023 · Cloud Native

Essential Kubernetes Security Practices to Safeguard Production Clusters

Learn the critical Kubernetes security measures for production environments, including RBAC access control, network policies, secret management, continuous monitoring, patch updates, API server hardening, Kubelet protection, pod security policies, and container hardening techniques, each illustrated with practical YAML examples and command snippets.

ContainerHardeningKubernetesNetworkPolicy
0 likes · 10 min read
Essential Kubernetes Security Practices to Safeguard Production Clusters
Architect
Architect
Nov 24, 2023 · Industry Insights

How We Evolved the Voice Chat Room Architecture to Scale with Real‑Time Interaction

This article chronicles the year‑long evolution of the voice‑chat room system, detailing how product‑driven requirements forced successive redesigns of both the live‑streaming and RTC subsystems, the introduction of session‑and‑channel abstractions, migration of mic‑seat management to the backend, and the implementation of monitoring, testing, and deployment practices that keep the architecture stable and extensible.

Domain-Driven DesignMicroservicesRBAC
0 likes · 28 min read
How We Evolved the Voice Chat Room Architecture to Scale with Real‑Time Interaction
Java High-Performance Architecture
Java High-Performance Architecture
Nov 21, 2023 · Information Security

Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization

This comprehensive guide walks you through setting up Spring Security in a Spring Boot project, configuring password encoding, implementing JWT-based authentication, building custom login and logout endpoints, managing user details with MyBatis Plus, and applying role‑based access control with custom permission handlers, all illustrated with complete code examples.

AuthenticationAuthorizationJWT
0 likes · 40 min read
Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization
政采云技术
政采云技术
Nov 2, 2023 · Information Security

Design and Implementation of a Multi‑System Data Permission Control System

This article describes a unified, configurable data‑permission framework built on RBAC, detailing its architecture, rule definition, integration workflow, Java SDK implementation, and practical examples to achieve flexible, low‑coupling access control across multiple backend systems.

Data PermissionJavaMyBatis
0 likes · 11 min read
Design and Implementation of a Multi‑System Data Permission Control System
Architect
Architect
Oct 30, 2023 · Information Security

How DuoLiXiong Built a Scalable Multi‑Platform RBAC Permission System

This article walks through DuoLiXiong’s three‑layer business architecture, identifies the challenges of managing permissions across dozens of platforms, explains the RBAC fundamentals and four model variants, details the concrete database schema and tree‑structured permission design, and explores row‑ and column‑level data permissions with practical examples.

BaiduData PermissionsPermission System
0 likes · 18 min read
How DuoLiXiong Built a Scalable Multi‑Platform RBAC Permission System
Architecture Digest
Architecture Digest
Oct 25, 2023 · Information Security

RBAC Permission Analysis and Spring Security Implementation Guide (including JWT and JSON Login)

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model variants, permission concepts, and user‑group usage, then demonstrates practical Spring Security setups ranging from simple in‑memory authentication to JWT integration, JSON‑based login, password encryption, and database‑backed authentication with full code examples.

AuthorizationJWTJava
0 likes · 18 min read
RBAC Permission Analysis and Spring Security Implementation Guide (including JWT and JSON Login)
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 2, 2023 · Frontend Development

Implementing Permission-Based Dynamic Routing in React with RBAC

This article explains how to build a permission‑driven dynamic routing system for management applications using React, React‑Router, and RBAC, covering the conceptual overview, server‑side role mapping, state management with Zustand, and step‑by‑step code examples for route definition, mapping, and rendering.

Dynamic RoutesPermission RoutingRBAC
0 likes · 10 min read
Implementing Permission-Based Dynamic Routing in React with RBAC
Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLDACRBAC
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Architect
Architect
Sep 4, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article details the design and development of a unified permission management service (MPS) that consolidates RBAC, ACL, and DAC models to solve fragmented enterprise permission issues, covering requirement analysis, technical selection, functional modules, deployment, and performance outcomes.

ACLDACGo
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
High Availability Architecture
High Availability Architecture
Aug 28, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article presents a comprehensive design and development of Baidu's Unified Permission Management Service (MPS), detailing its requirement analysis, technical selection, hybrid RBAC/ACL/DAC model, functional modules, implementation specifics, and operational results that demonstrate its effectiveness in consolidating enterprise-wide access control.

ACLDACRBAC
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)