Tagged articles
189 articles
Page 2 of 2
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLBackend DevelopmentBaidu
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
MaGe Linux Operations
MaGe Linux Operations
Jul 15, 2023 · Cloud Native

How to Secure Your Kubernetes Clusters with DevSecOps Best Practices

This article explains how to integrate security into the DevOps pipeline for Kubernetes, covering DevSecOps concepts, image protection, role‑based access control, network policies, encryption, etcd safeguarding, and disaster‑recovery strategies to keep clusters safe and releases fast.

DevSecOpsKubernetesNetworkPolicy
0 likes · 21 min read
How to Secure Your Kubernetes Clusters with DevSecOps Best Practices
Code Ape Tech Column
Code Ape Tech Column
Jun 27, 2023 · Information Security

RBAC Permission Design in the Codeape Chronic Disease Cloud Management System

This article explains how the Codeape chronic disease cloud management system implements role‑based access control (RBAC), detailing the underlying data models, permission types, Spring Security annotations, department/ward permission handling for both web/PAD clients, and the associated Java code snippets.

BackendHealthcareJava
0 likes · 16 min read
RBAC Permission Design in the Codeape Chronic Disease Cloud Management System
StarRocks
StarRocks
Apr 7, 2023 · Databases

StarRocks 3.0 Highlights: Storage‑Compute Separation, New RBAC, and Lakehouse Features

StarRocks 3.0 introduces a storage‑compute separation architecture, a full‑featured RBAC permission framework, enhanced materialized views, Trino‑compatible query dialect, richer Primary‑Key update/delete syntax, automatic partition creation, and numerous performance optimizations, marking a major step from OLAP to lakehouse analytics.

LakehouseRBACStarRocks
0 likes · 10 min read
StarRocks 3.0 Highlights: Storage‑Compute Separation, New RBAC, and Lakehouse Features
Architecture Digest
Architecture Digest
Apr 5, 2023 · Information Security

Design and Implementation of a Role‑Based Access Control System for the DuoliXiong Business Platform

This article introduces the DuoliXiong local‑life service platform, analyzes the challenges of permission management across its multi‑layered architecture, and details the design of a flat RBAC model—including business‑line isolation, user, role, and permission tables, tree‑structured permission mapping, and data‑level access controls—to support scalable, secure operations.

Data PermissionsMicroservicesPermission System
0 likes · 14 min read
Design and Implementation of a Role‑Based Access Control System for the DuoliXiong Business Platform
Efficient Ops
Efficient Ops
Apr 3, 2023 · Cloud Native

How to Secure Multi‑Tenant Kubernetes Clusters: Best Practices & Architecture

This article explains the concept of multi‑tenant Kubernetes clusters, outlines common enterprise scenarios, and details native security mechanisms such as RBAC, NetworkPolicy, PodSecurityPolicy, OPA, resource quotas, and dedicated nodes to achieve effective isolation and protect sensitive data.

Cloud NativeKubernetesNetworkPolicy
0 likes · 12 min read
How to Secure Multi‑Tenant Kubernetes Clusters: Best Practices & Architecture
System Architect Go
System Architect Go
Mar 22, 2023 · Information Security

Understanding Anonymous Access in Kubernetes API Server and How to Disable It

The article explains how Kubernetes clusters can permit anonymous API access via the --anonymous-auth flag, describes the authentication‑authorization‑admission flow, shows common RBAC bindings that enable this access, discusses its prevalence, and provides practical steps to disable anonymous access in both self‑managed and managed clusters.

Anonymous AccessKubernetesRBAC
0 likes · 7 min read
Understanding Anonymous Access in Kubernetes API Server and How to Disable It
Architecture Digest
Architecture Digest
Jan 30, 2023 · Information Security

Design and Implementation of a Multi‑Platform RBAC Permission System for DuoliXiong Business

This article introduces the DuoliXiong local‑service platform, analyzes the challenges of its multi‑platform permission management, and details the design of a role‑based access control (RBAC) system—including model selection, database schema, tree‑structured permission representation, multi‑business‑line isolation, and data‑level (row/column) permissions—culminating in a scalable solution for complex B‑end and O‑end applications.

Backend ArchitectureData PermissionsMicroservices
0 likes · 14 min read
Design and Implementation of a Multi‑Platform RBAC Permission System for DuoliXiong Business
Java High-Performance Architecture
Java High-Performance Architecture
Jan 29, 2023 · Information Security

Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC

This comprehensive guide walks you through Spring Security fundamentals, setting up a Spring Boot project, configuring authentication with JWT and Redis, implementing RBAC permission management, customizing error handling, enabling CORS, and addressing CSRF, providing complete code examples and detailed explanations for secure backend development.

AuthenticationAuthorizationJWT
0 likes · 45 min read
Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC
Baidu Geek Talk
Baidu Geek Talk
Dec 28, 2022 · Information Security

RBAC Permission System Design and Implementation for Local Life Services Platform

This article explains Baidu's Duoli Bear permission system, detailing its business context, challenges of multi‑role and platform isolation, and the custom RBAC design that uses a tree‑structured menu, role‑based data rules, and business‑line isolation to manage access across diverse services.

Backend ArchitectureDatabase designPermission System
0 likes · 13 min read
RBAC Permission System Design and Implementation for Local Life Services Platform
Su San Talks Tech
Su San Talks Tech
Dec 17, 2022 · Information Security

Integrating Data Permissions into RBAC: A Practical Guide

This article explains how to extend the classic Role‑Based Access Control (RBAC) model with fine‑grained data permissions, detailing rule definition, database design, role‑rule binding, and AOP‑based enforcement, and offers optimization tips such as rule groups for complex scenarios.

Data PermissionRBACRole-Based Access
0 likes · 8 min read
Integrating Data Permissions into RBAC: A Practical Guide
Programmer DD
Programmer DD
Dec 13, 2022 · Information Security

How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud

This article explains how to design a non‑intrusive, easy‑to‑configure, fine‑grained RBAC permission system using OAuth2, JWT, and Spring Cloud micro‑services, covering architecture, expression syntax, URL patterns, and micro‑frontend integration for scalable, maintainable access control.

JWTOAuth2RBAC
0 likes · 13 min read
How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud
ITPUB
ITPUB
Dec 5, 2022 · Information Security

Extending RBAC with Fine-Grained Data Permissions Using AOP

This article explains how to augment the classic Role‑Based Access Control (RBAC) model with row‑level data permissions, detailing rule definition, database design, role‑rule binding, and an AOP‑based implementation for dynamic SQL filtering.

Backend SecurityData PermissionRBAC
0 likes · 8 min read
Extending RBAC with Fine-Grained Data Permissions Using AOP
Weimob Technology Center
Weimob Technology Center
Nov 24, 2022 · Information Security

Designing a Flexible Permission Model for WOS: Merging RBAC and PBAC

This article examines traditional RBAC, ABAC, and PBAC access‑control models, evaluates their strengths and weaknesses, and presents a hybrid permission architecture tailored for 微盟's WOS system that combines role‑based and attribute‑based rules to achieve high flexibility and fine‑grained authorization.

ABACAuthorizationBackend
0 likes · 8 min read
Designing a Flexible Permission Model for WOS: Merging RBAC and PBAC
Java Architect Essentials
Java Architect Essentials
Oct 20, 2022 · Information Security

RBAC Permission Analysis and Spring Security Implementation with JWT and JSON Login

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model variants, permission concepts, and user‑group usage, then demonstrates practical Spring Security setups including basic configuration, JWT integration, JSON‑based login, password encryption, and database authentication with complete code examples.

JSON LoginJWTPassword Encryption
0 likes · 17 min read
RBAC Permission Analysis and Spring Security Implementation with JWT and JSON Login
IT Architects Alliance
IT Architects Alliance
Oct 7, 2022 · Information Security

Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide

This comprehensive tutorial explains RBAC concepts, model classifications, and permission handling, then walks through implementing Spring Security with in‑memory authentication, JWT integration, custom JSON login filters, password encryption, and database‑backed authentication, providing complete code examples and configuration details.

AuthenticationAuthorizationJWT
0 likes · 18 min read
Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide
Top Architect
Top Architect
Oct 6, 2022 · Information Security

RBAC Permission Analysis and Spring Security Implementation Guide

This article provides a comprehensive tutorial on role‑based access control (RBAC) concepts, model classifications, permission definitions, user‑group usage, and step‑by‑step implementations of Spring Security, JWT integration, JSON login, password encryption, and database authentication with extensive code examples.

AuthenticationBackend DevelopmentJWT
0 likes · 18 min read
RBAC Permission Analysis and Spring Security Implementation Guide
Java High-Performance Architecture
Java High-Performance Architecture
Aug 30, 2022 · Information Security

Why Permission Management Is Critical and How to Build Scalable RBAC Models

This article explains why strict permission management is essential for data security, illustrates various permission models—from basic data-view and edit rights to role‑based access control (RBAC), role inheritance, constraints, user groups, organizations, and positions—and provides practical database table designs for implementing scalable, ideal RBAC systems.

RBACRole InheritanceSecurity Architecture
0 likes · 16 min read
Why Permission Management Is Critical and How to Build Scalable RBAC Models
Cloud Native Technology Community
Cloud Native Technology Community
Aug 30, 2022 · Cloud Native

Governing the Rapid Adoption of Kubernetes in Enterprises

Enterprises face governance challenges as Kubernetes adoption surges, requiring centralized platforms, standardized blueprints, role‑based access control, policy enforcement, drift detection, and lifecycle management to maintain control, security, and agility across multiple clusters.

Cloud NativeDevOpsEnterprise
0 likes · 8 min read
Governing the Rapid Adoption of Kubernetes in Enterprises
Top Architect
Top Architect
Aug 28, 2022 · Information Security

Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures

This article explains why permission management is essential for data security, introduces various permission models including basic RBAC, role inheritance, constrained RBAC, and discusses user grouping, organization‑based roles, and detailed database schema designs for both standard and ideal RBAC systems.

RBACRole InheritanceSystem Design
0 likes · 16 min read
Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures
Java High-Performance Architecture
Java High-Performance Architecture
Aug 24, 2022 · Information Security

Mastering RBAC and Spring Security: From Basics to JWT Integration

This article provides a comprehensive guide to Role‑Based Access Control (RBAC) concepts, model classifications, and permission management, then walks through practical Spring Security setups—including basic usage, in‑memory authentication, JWT integration, JSON‑based login, password encryption, and database‑backed authentication, complete with code snippets and diagrams.

AuthenticationJWTJava
0 likes · 21 min read
Mastering RBAC and Spring Security: From Basics to JWT Integration
Top Architect
Top Architect
Aug 22, 2022 · Information Security

RBAC and Spring Security Tutorial: From Basic Role-Based Access Control to JWT Integration and JSON Login

This article provides a comprehensive guide on implementing role‑based access control (RBAC) with Spring Security, covering RBAC models, password encryption, in‑memory authentication, JWT integration, custom authentication filters for JSON login, and detailed configuration examples with full source code snippets.

AuthenticationJWTJava
0 likes · 16 min read
RBAC and Spring Security Tutorial: From Basic Role-Based Access Control to JWT Integration and JSON Login
Java Captain
Java Captain
Aug 21, 2022 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT and JSON Login

This article explains RBAC concepts and model classifications, demonstrates role‑based permission management, and provides step‑by‑step guides for using Spring Security with simple authentication, JWT token generation, JSON‑based login, password encryption, and database‑backed user authentication in Java applications.

AuthenticationJWTJava
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT and JSON Login
21CTO
21CTO
Aug 20, 2022 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role Inheritance

This article explains why permission management is essential, outlines common permission models such as RBAC and its extensions, discusses role inheritance, constraints, user groups, organizations and positions, and presents practical database schema designs for both standard and ideal RBAC systems.

Permission DesignRBACRole Inheritance
0 likes · 16 min read
Mastering Permission Management: From Basic RBAC to Advanced Role Inheritance
Ops Development Stories
Ops Development Stories
Aug 16, 2022 · Cloud Native

Master Kubernetes Authentication & Authorization: From Users to RBAC

This article explains how Kubernetes secures its API Server through authentication and authorization, covering user types, authentication methods such as client certificates, bearer tokens, OIDC, and static token files, and then details the RBAC model, role bindings, and service account usage for fine‑grained access control.

AuthorizationCloudNativeKubernetes
0 likes · 18 min read
Master Kubernetes Authentication & Authorization: From Users to RBAC
Architect
Architect
Aug 13, 2022 · Cloud Native

Kubernetes Is About APIs, Not Containers: Understanding the API Framework and CRDs

This article explains why Kubernetes’s true value lies in its extensible, declarative API framework rather than containers, illustrates the API types, shows how Custom Resource Definitions act like database tables, and provides practical examples of creating, querying, and managing CRDs with kubectl.

APICRDCloud Native
0 likes · 17 min read
Kubernetes Is About APIs, Not Containers: Understanding the API Framework and CRDs
IT Services Circle
IT Services Circle
Aug 5, 2022 · Information Security

Designing Permission Systems: Overview of ACL, DAC, MAC, ABAC, and RBAC Models

This article explains the fundamentals of permission system design, introducing five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical implementation considerations such as role hierarchy, constraints, and data permissions.

ABACRBACaccess control
0 likes · 15 min read
Designing Permission Systems: Overview of ACL, DAC, MAC, ABAC, and RBAC Models
macrozheng
macrozheng
Aug 4, 2022 · Information Security

Mastering Access Control: 5 Core Permission Models Explained

This article introduces the design of permission systems and thoroughly explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—along with their principles, examples, drawbacks, and practical implementation details for real‑world applications.

ACLRBACSecurity
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models Explained
Code Ape Tech Column
Code Ape Tech Column
Jul 18, 2022 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the design of permission systems by introducing five major access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical implementation considerations for user, role, and permission management in enterprise applications.

ACLRBACaccess control
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 13, 2022 · Information Security

Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models

This article introduces the problems of the legacy permission approach at Zhuanzhuan, compares industry‑standard RBAC and ABAC models, explains the design rationale for a hybrid RBAC‑based system, and outlines the core modules, role hierarchy, and permission types for the new unified permission management platform.

ABACAuthorizationRBAC
0 likes · 15 min read
Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models
Baidu Geek Talk
Baidu Geek Talk
Apr 25, 2022 · Information Security

Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC

Baidu’s ToB Account Permission Platform provides a unified, configurable login and permission service—including multi‑tenant account management, SSO, OAuth, and the GD‑RBAC model—delivering secure, high‑performance access for over ten million enterprise accounts across multiple product lines.

AuthenticationAuthorizationBackend
0 likes · 27 min read
Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC
Sohu Tech Products
Sohu Tech Products
Dec 22, 2021 · Frontend Development

General Architecture Plan for a Vue‑based Backend Management System

This article presents a comprehensive guide to building a generic backend management system with Vue, covering project initialization using Vite or Vue‑CLI, code standards, CSS architecture (ITCSS, BEM, ACSS), JWT authentication, dynamic menu and route generation, RBAC, caching, and component templating.

Frontend ArchitectureJWTRBAC
0 likes · 28 min read
General Architecture Plan for a Vue‑based Backend Management System
Java Captain
Java Captain
Dec 11, 2021 · Backend Development

Overview of the eladmin Open‑Source Spring Boot + Vue Admin System

The article introduces eladmin, an open‑source, front‑back separated admin platform built with Spring Boot, JPA, Spring Security, Redis and Vue, detailing its features, modular architecture, key functionalities, highlights, and providing a link to its GitHub repository.

Backend DevelopmentCode GenerationRBAC
0 likes · 5 min read
Overview of the eladmin Open‑Source Spring Boot + Vue Admin System
Architecture Digest
Architecture Digest
Dec 4, 2021 · Backend Development

Introduction to eladmin: An Open‑Source Spring Boot + Vue Admin System

The article presents a detailed overview of the open‑source eladmin project, describing its Spring Boot‑based backend, Vue front‑end, modular architecture, RBAC permission model, code generation, and various built‑in features such as logging, monitoring, and cloud storage integration.

Code GenerationRBACSpring Boot
0 likes · 7 min read
Introduction to eladmin: An Open‑Source Spring Boot + Vue Admin System
Architect's Guide
Architect's Guide
Nov 15, 2021 · Backend Development

Java Backend Project for Community COVID‑19 Management System with RBAC and Service Layer Implementation

This article presents a complete Java backend project for community‑based COVID‑19 management, detailing its architecture, modules such as login, daily epidemic tracking, prevention management, system administration and user management, and provides extensive SpringBoot service‑layer code examples with RBAC permission control.

JavaRBACServiceLayer
0 likes · 23 min read
Java Backend Project for Community COVID‑19 Management System with RBAC and Service Layer Implementation
ZhiKe AI
ZhiKe AI
Sep 13, 2021 · Cloud Native

Step-by-Step Guide to Installing Helm 3 and Helm 2 on Linux

This article provides a complete Linux walkthrough for installing Helm 3, then Helm 2 client and Tiller server, including downloading binaries, extracting files, configuring RBAC, initializing Tiller, and verifying the installation with kubectl and helm commands.

LinuxRBAChelm
0 likes · 3 min read
Step-by-Step Guide to Installing Helm 3 and Helm 2 on Linux
Sohu Tech Products
Sohu Tech Products
Sep 1, 2021 · Frontend Development

Comprehensive Architecture Guide for a Generic Backend Management System Using Vue and Vite

This article presents a detailed architecture solution for building a generic backend management system with Vue, covering project scaffolding choices, Vite configuration, ESLint/Prettier setup, CSS architecture (ITCSS, BEM, ACSS), JWT authentication, dynamic menu design, RBAC, route registration, component caching, and template generation using Plop.

JWTRBACVite
0 likes · 32 min read
Comprehensive Architecture Guide for a Generic Backend Management System Using Vue and Vite
Top Architect
Top Architect
Sep 1, 2021 · Backend Development

Design and Architecture of a Payment Operation Platform

This article explains the purpose, evolution, business logic, design principles, system architecture, permission model, and technical implementation of a payment operation platform that serves internal staff such as developers, testers, product managers, finance, and customer service within a payment company.

BackendRBACSecurity
0 likes · 8 min read
Design and Architecture of a Payment Operation Platform
Qingyun Technology Community
Qingyun Technology Community
Aug 27, 2021 · Cloud Native

How KubeSphere’s Cloud‑Native Architecture Simplifies Kubernetes Management

KubeSphere builds a cloud‑native container management system atop Kubernetes, offering multi‑cloud, multi‑cluster management, declarative APIs, and RBAC‑based permission control through its core components ks‑console, ks‑apiserver, and ks‑controller‑manager, while leveraging CustomResources, controllers, and Go‑restful for extensible, secure operations.

APICloud NativeCustomResource
0 likes · 13 min read
How KubeSphere’s Cloud‑Native Architecture Simplifies Kubernetes Management
Architecture Digest
Architecture Digest
Aug 25, 2021 · Operations

Design and Architecture of a Payment Operations Platform

The article explains the role, evolution, business logic, user requirements, and design principles of a payment operations platform, detailing its architecture, interaction model, permission system, and technical stack to support internal staff with secure, efficient, and easy‑to‑use services.

Backend ArchitectureRBACSystem Design
0 likes · 8 min read
Design and Architecture of a Payment Operations Platform
21CTO
21CTO
Jul 2, 2021 · Fundamentals

Mastering RBAC: From Basic Models to Advanced Permission Design

This article explains the fundamentals of permission management, detailing RBAC models, user‑role‑permission relationships, organization and position structures, authorization workflows, database schema design, and popular security frameworks for building robust backend access control systems.

Backend DevelopmentPermission ModelRBAC
0 likes · 12 min read
Mastering RBAC: From Basic Models to Advanced Permission Design
Code Ape Tech Column
Code Ape Tech Column
Jun 18, 2021 · Information Security

Mastering RBAC: From Basic Models to Advanced Permission Architectures

This article explains the fundamentals of permission management, detailing the classic RBAC0 model and its extensions RBAC1‑RBAC3, and explores how roles, users, groups, organizations, and positions interrelate in both single‑system and distributed micro‑service architectures, including practical table designs and framework options.

AuthorizationBackend SecurityMicroservices
0 likes · 12 min read
Mastering RBAC: From Basic Models to Advanced Permission Architectures
Ops Development Stories
Ops Development Stories
Apr 2, 2021 · Information Security

Mastering Casbin: Build Secure RBAC in Go with Gin and Gorm

This article explains what Casbin is, how its PERM model works, and provides a step‑by‑step guide to integrate Casbin’s RBAC authorization into a Go project using Gin, Gorm, and a MySQL adapter, including model configuration, policy storage, middleware enforcement, and verification.

CasbinGORMGin
0 likes · 13 min read
Mastering Casbin: Build Secure RBAC in Go with Gin and Gorm
Youzan Coder
Youzan Coder
Mar 12, 2021 · Information Security

How Youzan Re‑engineered Its Permission System for Scalable Access Control

This article examines the evolution of Youzan's permission management—from the original SAM system using a 64‑bit RBAC model to the flexible 2.0 architecture with rig, dynamic menu, and widget delegation—highlighting design choices, implementation details, challenges solved, and measurable business impact.

BackendMobile DevelopmentRBAC
0 likes · 15 min read
How Youzan Re‑engineered Its Permission System for Scalable Access Control
Java Captain
Java Captain
Mar 1, 2021 · Backend Development

Overview of eladmin: An Open‑Source Spring Boot + Vue Backend Management System

The article presents eladmin, a fully open‑source, front‑back separated admin platform built with Spring Boot, JPA, Spring Security, Redis and Vue, detailing its features, modular architecture, code‑generation capabilities, and highlights that make it a valuable learning resource for developers.

Backend ManagementCode GenerationRBAC
0 likes · 6 min read
Overview of eladmin: An Open‑Source Spring Boot + Vue Backend Management System
php Courses
php Courses
Feb 5, 2021 · Backend Development

Implementing Role-Based Access Control (RBAC) with the Auth Class in ThinkPHP

This guide explains how to set up an Auth class in ThinkPHP, create the necessary database tables for groups and rules, design admin and permission tables, configure user‑group relationships, handle login sessions, and integrate the Auth class into a common controller to enforce RBAC checks.

AuthenticationAuthorizationBackend
0 likes · 4 min read
Implementing Role-Based Access Control (RBAC) with the Auth Class in ThinkPHP
MaGe Linux Operations
MaGe Linux Operations
Sep 30, 2020 · Cloud Native

Master Kubernetes ServiceAccounts and RBAC: From Basics to Custom Roles

This guide explains the difference between Kubernetes UserAccounts and ServiceAccounts, shows how default and custom ServiceAccounts create associated secrets, demonstrates mounting credentials in pods, adds image pull secrets, and walks through RBAC concepts with Roles, ClusterRoles, and bindings to restrict a user to a specific namespace.

CloudNativeKubernetesRBAC
0 likes · 20 min read
Master Kubernetes ServiceAccounts and RBAC: From Basics to Custom Roles
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Sep 24, 2020 · Information Security

Permission System Design and RBAC Implementation Practice in Backend Applications

The article explains permission system fundamentals, classifies page, function, and data permissions, compares DAC, MAC, RBAC, and ABAC models, details RBAC variants, and demonstrates a practical Egg framework plugin implementation that configures roles, resources, and data rules to achieve flexible, secure backend access control.

Backend SecurityData PermissionsEgg Framework
0 likes · 10 min read
Permission System Design and RBAC Implementation Practice in Backend Applications
Selected Java Interview Questions
Selected Java Interview Questions
Sep 1, 2020 · Information Security

Design of Permission System and RBAC Models

This article explains the fundamentals and extensions of role‑based access control (RBAC), covering user, role, permission, organization, and group models, authorization workflows, database schema, and common frameworks such as Apache Shiro and Spring Security for building robust permission systems.

AuthorizationPermission ModelRBAC
0 likes · 12 min read
Design of Permission System and RBAC Models
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Aug 16, 2020 · Cloud Native

How to Configure Alertmanager, Add WeChat Alerts, and Enable Automatic Service Discovery in Kubernetes

This guide walks through modifying Alertmanager to use a NodePort service, decoding and editing its secret to add custom receivers and a WeChat template, recreating the secret, and extending Prometheus Operator with additional scrape configs for automatic service discovery, including RBAC adjustments and verification steps.

KubernetesRBACServiceDiscovery
0 likes · 10 min read
How to Configure Alertmanager, Add WeChat Alerts, and Enable Automatic Service Discovery in Kubernetes
Laravel Tech Community
Laravel Tech Community
Aug 8, 2020 · Information Security

Understanding RBAC Permission Models and Authorization Processes

This article explains the core RBAC0 model and its extensions (RBAC1, RBAC2, RBAC3), discusses user groups, organizations and positions, and outlines manual and approval-based authorization workflows along with a sample database schema for implementing role‑based access control in complex systems.

AuthorizationPermission ModelRBAC
0 likes · 10 min read
Understanding RBAC Permission Models and Authorization Processes
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Jul 9, 2020 · Cloud Native

Deploy and Manage Prometheus Operator on Kubernetes: A Step‑by‑Step Guide

This article explains what the Prometheus Operator is, how it extends Kubernetes with custom resources, lists the CRDs it provides, and walks through a complete deployment—including cloning the source, creating a monitoring namespace, applying RBAC, installing the operator, creating a Prometheus instance, configuring ServiceMonitor, and troubleshooting common permission errors—using concrete YAML manifests and kubectl commands.

KubernetesPrometheus OperatorRBAC
0 likes · 18 min read
Deploy and Manage Prometheus Operator on Kubernetes: A Step‑by‑Step Guide
DevOps Coach
DevOps Coach
Jul 3, 2020 · Information Security

Secure Elastic Stack: End-to-End TLS, RBAC, and Password‑Free Beats Setup

Learn how to build a three‑node Elasticsearch cluster with full TLS encryption, configure Kibana’s HTTPS settings, create minimal‑privilege Beats‑writer roles, and eliminate clear‑text passwords using Elastic Stack’s keystore, all within a reproducible Vagrant environment for secure, scalable monitoring.

BeatsElastic StackRBAC
0 likes · 26 min read
Secure Elastic Stack: End-to-End TLS, RBAC, and Password‑Free Beats Setup
Architecture Digest
Architecture Digest
Jan 22, 2020 · Information Security

Permission System Design and RBAC Models

This article explains the fundamentals of permission system design, covering the core RBAC0 model, its extensions RBAC1, RBAC2, RBAC3, as well as user groups, organizational structures, authorization processes, database schema considerations, and common implementation frameworks for secure backend access control.

RBACRole Hierarchyaccess control
0 likes · 12 min read
Permission System Design and RBAC Models
Alibaba Cloud Native
Alibaba Cloud Native
Jan 10, 2020 · Cloud Native

How to Secure Multi‑Tenant Kubernetes Clusters: Practical Isolation Strategies

This article explains the concept of multi‑tenant Kubernetes clusters, distinguishes soft and hard isolation, describes common enterprise and SaaS/KaaS scenarios, and provides step‑by‑step guidance on using native Kubernetes features such as RBAC, NetworkPolicy, PSP, OPA, resource quotas, pod priority, node taints, and secret encryption to achieve robust security isolation.

KubernetesNamespaceNetworkPolicy
0 likes · 14 min read
How to Secure Multi‑Tenant Kubernetes Clusters: Practical Isolation Strategies
Programmer DD
Programmer DD
Dec 17, 2019 · Information Security

Understanding RBAC: Role‑Based Access Control Models for Secure Spring Applications

This article explains why Role‑Based Access Control (RBAC) is essential for modern applications, outlines the four RBAC model variants (RBAC0‑RBAC3), clarifies core concepts such as users, roles, sessions and permissions, and shows how RBAC improves scalability and security in Spring Security projects.

RBACRole-Based Access ControlSecurity Architecture
0 likes · 9 min read
Understanding RBAC: Role‑Based Access Control Models for Secure Spring Applications
Programmer DD
Programmer DD
Nov 12, 2019 · Backend Development

Designing Scalable Role‑Based Access Control: A Complete Database Blueprint

This article explains the fundamentals of role‑based access control, introduces user groups and role groups for batch authorization, and provides a detailed data‑dictionary with database tables and diagrams to help developers design a flexible, extensible permission system for large applications.

BackendDatabase designRBAC
0 likes · 7 min read
Designing Scalable Role‑Based Access Control: A Complete Database Blueprint
Programmer DD
Programmer DD
Nov 3, 2019 · Information Security

Spring Security vs Apache Shiro: Which Java Security Framework Wins?

This article compares Spring Security and Apache Shiro, explaining their authentication and authorization features, filter‑chain mechanisms, RBAC model, and related security concepts to help Java developers choose the right framework for production‑grade web applications.

Apache ShiroAuthenticationRBAC
0 likes · 6 min read
Spring Security vs Apache Shiro: Which Java Security Framework Wins?
Programmer DD
Programmer DD
Aug 26, 2019 · Cloud Native

Mastering Kubernetes RBAC: From Basics to Advanced Auditing Tools

This article explains Kubernetes RBAC fundamentals, demonstrates how to create roles, bindings, and service accounts, and introduces practical auditing commands and tools such as kubectl can‑i, who‑can, rakkess, rback, and RBAC‑View, helping you secure clusters with least‑privilege policies.

AuditingAuthorizationKubernetes
0 likes · 12 min read
Mastering Kubernetes RBAC: From Basics to Advanced Auditing Tools
Java Captain
Java Captain
Jun 21, 2019 · Information Security

Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks

This article explores the concept of permissions, distinguishes their noun and verb attributes, outlines minimal‑privilege and data‑abstraction principles, examines server‑side versus client‑side access control, discusses role‑based access control and table design, and compares common Java security frameworks.

Permission DesignRBACaccess control
0 likes · 11 min read
Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks
HomeTech
HomeTech
Jun 12, 2019 · Cloud Computing

Design and Implementation of Autohome Enterprise Cloud Disk

The article describes the background, goals, architecture, security, and future plans of Autohome's internally developed enterprise cloud disk, detailing its multi‑layer design, RBAC permission model, file processing, task scheduling, and integration with various corporate systems to improve collaborative work efficiency.

EnterpriseRBACcloud storage
0 likes · 16 min read
Design and Implementation of Autohome Enterprise Cloud Disk
Java Captain
Java Captain
Jun 3, 2019 · Information Security

Designing Role-Based Access Control and Permission Data Model

This article explains the fundamentals of role‑based access control, how roles and permissions are structured, the use of user groups to simplify large‑scale authorizations, and presents a comprehensive database schema—including tables for users, roles, permissions, resources, and logs—to support flexible and extensible permission management.

Database designPermission modelingRBAC
0 likes · 6 min read
Designing Role-Based Access Control and Permission Data Model
Java Architecture Diary
Java Architecture Diary
Mar 12, 2019 · Backend Development

Build a Scalable RBAC System with Spring Cloud Finchley & OAuth2

This open‑source project offers a Spring Cloud Finchley‑based RBAC permission system using Spring Security OAuth2, a data‑driven Element‑ui front‑end that works without Vue experience, and full container support (Docker, Kubernetes, Rancher2) plus production‑ready lambda, Stream API and WebFlux examples, with detailed dependency listings and contribution guidelines.

DockerOAuth2RBAC
0 likes · 2 min read
Build a Scalable RBAC System with Spring Cloud Finchley & OAuth2
网易UEDC
网易UEDC
Aug 6, 2018 · Fundamentals

Mastering Permission Design: From RBAC Basics to Advanced Strategies

This article walks designers and developers through the challenges of permission design, explains the RBAC model and its extensions, and offers practical tips for splitting, configuring, and managing permissions to build robust, user‑friendly access control systems.

Permission DesignRBACRole-Based Access Control
0 likes · 13 min read
Mastering Permission Design: From RBAC Basics to Advanced Strategies
Youzan Coder
Youzan Coder
Mar 16, 2018 · Information Security

Design and Implementation of the SAM Permission System for Retail Platforms

Youzan’s SAM permission system implements a scalable RBAC framework for its Retail platform—using binary‑encoded permission bits, micro‑service architecture, and unified menu/API checks—to flexibly assign and verify roles across PC, App, Pad, and future custom‑role scenarios, enhancing operational efficiency and security.

Permission SystemRBACaccess control
0 likes · 23 min read
Design and Implementation of the SAM Permission System for Retail Platforms
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Sep 8, 2017 · Information Security

How Guardian 5.0 Revolutionizes Big Data Security with Multi‑Granular Permissions

Guardian 5.0 transforms big‑data security by introducing a standalone service, an enhanced ARBAC model, fine‑grained permission and quota management, visual configuration, unified LDAP/Kerberos authentication, and simplified operations, delivering higher flexibility, availability, and efficiency for enterprise data protection.

Guardian 5.0RBACResource Management
0 likes · 7 min read
How Guardian 5.0 Revolutionizes Big Data Security with Multi‑Granular Permissions