Tag

role-based access

0 views collected around this technical thread.

Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

Permission ManagementRBACaccess control
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
Architecture Digest
Architecture Digest
Jul 11, 2024 · Backend Development

MyBatis-Plus Data Permission Interceptor: Annotation, Interceptor, and Role-Based Scope Implementation

This guide explains how to implement data permission control in MyBatis-Plus by creating a custom annotation, an interceptor that modifies SQL before execution, a handler that builds WHERE clauses based on user roles, and how to register the interceptor in the MyBatis-Plus plugin, covering both basic and advanced versions.

Data PermissionInterceptorJava
0 likes · 13 min read
MyBatis-Plus Data Permission Interceptor: Annotation, Interceptor, and Role-Based Scope Implementation
Architects Research Society
Architects Research Society
May 15, 2024 · Information Security

Understanding Role‑Based Security and Business Units in Microsoft Dataverse

This article explains Microsoft Dataverse’s comprehensive security model, covering role‑based security, business units, hierarchical and matrix data access structures, record and column‑level security, and practical steps for configuring ownership, teams, and integration with Microsoft Entra security groups.

Business UnitsDataverseRecord Ownership
0 likes · 21 min read
Understanding Role‑Based Security and Business Units in Microsoft Dataverse
Top Architect
Top Architect
Dec 24, 2023 · Backend Development

Design and Implementation of a Configurable Approval Workflow System

This article explains how to design a flexible approval workflow with serial, parallel, conditional, and mixed processes, defines the required database tables, shows UI mock‑ups, and provides Java Spring code for handling approval actions, including auto‑pass, delegation, and rule‑based field visibility.

Approval WorkflowDatabase DesignJava
0 likes · 25 min read
Design and Implementation of a Configurable Approval Workflow System
Code Ape Tech Column
Code Ape Tech Column
Nov 15, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation

This article explains the principles and workflow of Single Sign‑On using OAuth2.0, illustrates the process with a real‑life analogy, and provides a complete Spring Boot example—including authorization server, client configuration, and role‑based access control—suitable for microservice architectures.

OAuth2SSOSpring Boot
0 likes · 12 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 22, 2022 · Information Security

Master Spring Security: Custom Request Interception & Login Page

This tutorial demonstrates how to configure Spring Security to selectively intercept requests, permit static resources, enforce role‑based access, and replace the default login page with a custom Thymeleaf view, complete with code examples and screenshots.

Spring BootSpring Securitycustom login page
0 likes · 9 min read
Master Spring Security: Custom Request Interception & Login Page
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 13, 2022 · Information Security

Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models

This article introduces the problems of the legacy permission approach at Zhuanzhuan, compares industry‑standard RBAC and ABAC models, explains the design rationale for a hybrid RBAC‑based system, and outlines the core modules, role hierarchy, and permission types for the new unified permission management platform.

ABACPermission ManagementRBAC
0 likes · 15 min read
Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models
Architecture Digest
Architecture Digest
Jan 2, 2018 · Information Security

Understanding the Essence of Permissions: Resources, Access, and Authorization Models

This article explains the fundamental nature of permissions as limited licensed access to protected resources, defines what constitutes a resource in software, outlines resource identification and limitation, and describes permission classifications, control models, and authorization mechanisms such as role‑based access.

Permissionsaccess controlauthorization
0 likes · 7 min read
Understanding the Essence of Permissions: Resources, Access, and Authorization Models