Tagged articles
16 articles
Page 1 of 1
Digital Planet
Digital Planet
Apr 29, 2026 · Backend Development

Why Traditional Code‑Issuing Platforms’ Permission Design Is Doomed to Fail

The article explains how the hard‑coded, role‑bound permission model of traditional code‑issuing platforms collapses when an organization’s structure changes, and shows how a three‑layer decoupled architecture can provide fine‑grained, configurable access that turns the platform into true enterprise infrastructure.

Backend DevelopmentIdentity ManagementPermission Design
0 likes · 12 min read
Why Traditional Code‑Issuing Platforms’ Permission Design Is Doomed to Fail
Coder Trainee
Coder Trainee
Mar 5, 2026 · Backend Development

A Veteran Programmer’s Simple RBAC Permission System Design

This article walks through a straightforward back‑office permission system, defining permissions as resource collections, presenting a five‑table database schema, and explaining how classic Role‑Based Access Control (RBAC) simplifies permission management for multiple users.

BackendDatabase designPermission System
0 likes · 3 min read
A Veteran Programmer’s Simple RBAC Permission System Design
Selected Java Interview Questions
Selected Java Interview Questions
Apr 2, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including classic RBAC, role inheritance, constrained RBAC, and discusses practical extensions such as user groups, organizations, positions, and provides database schema designs for both standard and ideal RBAC implementations.

AuthorizationRBACRole-Based Access Control
0 likes · 19 min read
Understanding Permission Management and RBAC Models
Top Architect
Top Architect
Mar 12, 2024 · Information Security

Why Permission Management Is Needed and How to Design RBAC Models

The article explains the necessity of strict permission management in enterprises, introduces various permission models such as basic RBAC, role‑inheritance RBAC and constrained RBAC, and provides detailed table designs and best‑practice recommendations for implementing scalable and secure access control systems.

RBACRole-Based Access Controlaccess control
0 likes · 22 min read
Why Permission Management Is Needed and How to Design RBAC Models
php Courses
php Courses
Aug 9, 2023 · Backend Development

Building a Simple User Permission Management System with PHP

This article explains how to develop a simple yet powerful user permission management system for a blog using PHP, covering database schema design, user authentication, role and permission handling, and code examples for login, permission checks, and access control.

Database designPHPRole-Based Access Control
0 likes · 7 min read
Building a Simple User Permission Management System with PHP
Java High-Performance Architecture
Java High-Performance Architecture
Aug 4, 2023 · Backend Development

Implement Role‑Based Data Permissions in MyBatis‑Plus with Custom Interceptors

This guide explains how to enforce user‑role based data access in MyBatis‑Plus by creating a custom annotation, building an InnerInterceptor that modifies SQL WHERE clauses, configuring the interceptor in the MyBatis‑Plus plugin, and extending the approach to handle department‑level and self‑only scopes.

Backend DevelopmentData PermissionInterceptor
0 likes · 15 min read
Implement Role‑Based Data Permissions in MyBatis‑Plus with Custom Interceptors
Baidu Geek Talk
Baidu Geek Talk
Dec 28, 2022 · Information Security

RBAC Permission System Design and Implementation for Local Life Services Platform

This article explains Baidu's Duoli Bear permission system, detailing its business context, challenges of multi‑role and platform isolation, and the custom RBAC design that uses a tree‑structured menu, role‑based data rules, and business‑line isolation to manage access across diverse services.

Backend ArchitectureDatabase designPermission System
0 likes · 13 min read
RBAC Permission System Design and Implementation for Local Life Services Platform
Software Development Quality
Software Development Quality
Oct 19, 2022 · Operations

How an Internal Developer Platform Solves the 5 Core Challenges of Modern DevOps

Internal Developer Platforms (IDPs) integrate five essential components—application configuration management, infrastructure orchestration, environment management, deployment management, and role-based access control—to streamline DevOps workflows, improve scalability, enable self-service environments, and enforce secure, version-controlled operations across modern cloud-native infrastructures.

Configuration ManagementDevOpsInternal Developer Platform
0 likes · 21 min read
How an Internal Developer Platform Solves the 5 Core Challenges of Modern DevOps
Java Architect Essentials
Java Architect Essentials
Oct 8, 2022 · Backend Development

Spring Boot Security Permission Management Tutorial with Role and Menu Implementation

This article provides a step‑by‑step guide to building a Spring Boot permission management system using Spring Security, Spring Data JPA, Thymeleaf and Bootstrap, covering database design, entity classes, Maven setup, security configuration, dynamic menu loading, front‑end rendering and testing with full source code examples.

Role-Based Access ControlSpring Bootpermission management
0 likes · 19 min read
Spring Boot Security Permission Management Tutorial with Role and Menu Implementation
Top Architect
Top Architect
Dec 16, 2021 · Backend Development

Designing Dynamic Role‑Based Permission Management for Frontend and Backend Systems

This article explains the shortcomings of static front‑end permission schemes in modern SPA architectures and presents a comprehensive, database‑driven user‑role‑page‑function‑API model that enables dynamic, fine‑grained access control for both frontend menus and backend endpoints.

BackendDatabase designRole-Based Access Control
0 likes · 10 min read
Designing Dynamic Role‑Based Permission Management for Frontend and Backend Systems
macrozheng
macrozheng
Aug 19, 2021 · Backend Development

Mastering Sa-Token: Simplify SpringBoot Authentication and Authorization

This guide walks you through integrating the lightweight Sa-Token framework into a SpringBoot project, covering dependency setup, configuration, login, role and permission checks, as well as global exception handling, with complete code examples and practical screenshots.

AuthenticationAuthorizationJava
0 likes · 13 min read
Mastering Sa-Token: Simplify SpringBoot Authentication and Authorization
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Sep 24, 2020 · Information Security

Permission System Design and RBAC Implementation Practice in Backend Applications

The article explains permission system fundamentals, classifies page, function, and data permissions, compares DAC, MAC, RBAC, and ABAC models, details RBAC variants, and demonstrates a practical Egg framework plugin implementation that configures roles, resources, and data rules to achieve flexible, secure backend access control.

Backend SecurityData PermissionsEgg Framework
0 likes · 10 min read
Permission System Design and RBAC Implementation Practice in Backend Applications
Programmer DD
Programmer DD
Dec 19, 2019 · Information Security

Master Role-Based Access Control with Spring Security: Practical Guide

This article explains how to implement role‑based access control in Spring Security by embedding roles into UserDetails, configuring HttpSecurity with hasRole/hasAnyRole/hasAuthority, handling anonymous users, and using permitAll, providing code examples and detailed explanations for each approach.

AuthorizationBackend SecurityJava
0 likes · 7 min read
Master Role-Based Access Control with Spring Security: Practical Guide
Programmer DD
Programmer DD
Dec 17, 2019 · Information Security

Understanding RBAC: Role‑Based Access Control Models for Secure Spring Applications

This article explains why Role‑Based Access Control (RBAC) is essential for modern applications, outlines the four RBAC model variants (RBAC0‑RBAC3), clarifies core concepts such as users, roles, sessions and permissions, and shows how RBAC improves scalability and security in Spring Security projects.

RBACRole-Based Access ControlSecurity Architecture
0 likes · 9 min read
Understanding RBAC: Role‑Based Access Control Models for Secure Spring Applications
网易UEDC
网易UEDC
Aug 6, 2018 · Fundamentals

Mastering Permission Design: From RBAC Basics to Advanced Strategies

This article walks designers and developers through the challenges of permission design, explains the RBAC model and its extensions, and offers practical tips for splitting, configuring, and managing permissions to build robust, user‑friendly access control systems.

Permission DesignRBACRole-Based Access Control
0 likes · 13 min read
Mastering Permission Design: From RBAC Basics to Advanced Strategies