Tagged articles
13 articles
Page 1 of 1
Coder Trainee
Coder Trainee
May 12, 2026 · Backend Development

Designing a Logistics Prepaid Deduction System: Architecture & Core Implementation

This article details a logistics‑focused prepaid deduction platform built with a Spring Boot backend and Vue 3 frontend, covering precise cent‑to‑yuan handling, role‑based view isolation, VO‑based pagination, automatic deduction workflow, and an Apple‑style responsive UI using Tailwind CSS.

Money PrecisionRole-Based AccessSpring Boot
0 likes · 6 min read
Designing a Logistics Prepaid Deduction System: Architecture & Core Implementation
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

AuthorizationRBACRole-Based Access
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
Architecture Digest
Architecture Digest
Jul 11, 2024 · Backend Development

MyBatis-Plus Data Permission Interceptor: Annotation, Interceptor, and Role-Based Scope Implementation

This guide explains how to implement data permission control in MyBatis-Plus by creating a custom annotation, an interceptor that modifies SQL before execution, a handler that builds WHERE clauses based on user roles, and how to register the interceptor in the MyBatis-Plus plugin, covering both basic and advanced versions.

BackendData PermissionInterceptor
0 likes · 13 min read
MyBatis-Plus Data Permission Interceptor: Annotation, Interceptor, and Role-Based Scope Implementation
Architects Research Society
Architects Research Society
May 15, 2024 · Information Security

Understanding Role‑Based Security and Business Units in Microsoft Dataverse

This article explains Microsoft Dataverse’s comprehensive security model, covering role‑based security, business units, hierarchical and matrix data access structures, record and column‑level security, and practical steps for configuring ownership, teams, and integration with Microsoft Entra security groups.

Business UnitsDataverseRecord Ownership
0 likes · 21 min read
Understanding Role‑Based Security and Business Units in Microsoft Dataverse
Top Architect
Top Architect
Dec 24, 2023 · Backend Development

Design and Implementation of a Configurable Approval Workflow System

This article explains how to design a flexible approval workflow with serial, parallel, conditional, and mixed processes, defines the required database tables, shows UI mock‑ups, and provides Java Spring code for handling approval actions, including auto‑pass, delegation, and rule‑based field visibility.

Database designRole-Based Accessapproval workflow
0 likes · 25 min read
Design and Implementation of a Configurable Approval Workflow System
Su San Talks Tech
Su San Talks Tech
Dec 17, 2022 · Information Security

Integrating Data Permissions into RBAC: A Practical Guide

This article explains how to extend the classic Role‑Based Access Control (RBAC) model with fine‑grained data permissions, detailing rule definition, database design, role‑rule binding, and AOP‑based enforcement, and offers optimization tips such as rule groups for complex scenarios.

Data PermissionRBACRole-Based Access
0 likes · 8 min read
Integrating Data Permissions into RBAC: A Practical Guide
58UXD
58UXD
Dec 8, 2022 · Product Management

5 Core Design Principles Every Collaborative Office Tool Must Follow

This article outlines five essential design traits—asynchronous collaboration, traceability, multidimensional notifications, role‑based permission differences, and output standardization—that underpin effective collaborative office products across various scenarios.

AsynchronousCollaborationNotification
0 likes · 9 min read
5 Core Design Principles Every Collaborative Office Tool Must Follow
Code Ape Tech Column
Code Ape Tech Column
Nov 15, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation

This article explains the principles and workflow of Single Sign‑On using OAuth2.0, illustrates the process with a real‑life analogy, and provides a complete Spring Boot example—including authorization server, client configuration, and role‑based access control—suitable for microservice architectures.

AuthenticationAuthorizationMicroservices
0 likes · 12 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 13, 2022 · Information Security

Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models

This article introduces the problems of the legacy permission approach at Zhuanzhuan, compares industry‑standard RBAC and ABAC models, explains the design rationale for a hybrid RBAC‑based system, and outlines the core modules, role hierarchy, and permission types for the new unified permission management platform.

ABACAuthorizationRBAC
0 likes · 15 min read
Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models
Architecture Digest
Architecture Digest
Jan 2, 2018 · Information Security

Understanding the Essence of Permissions: Resources, Access, and Authorization Models

This article explains the fundamental nature of permissions as limited licensed access to protected resources, defines what constitutes a resource in software, outlines resource identification and limitation, and describes permission classifications, control models, and authorization mechanisms such as role‑based access.

AuthorizationPermissionsResource Management
0 likes · 7 min read
Understanding the Essence of Permissions: Resources, Access, and Authorization Models