Tag

role management

1 views collected around this technical thread.

Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 14, 2022 · Databases

Understanding User and Role Management in Cassandra Clusters Across Data Centers

This article explains how Cassandra clusters organize nodes, racks, and data centers, describes the gossip and snitch protocols, token ring architecture, replication strategies, and provides step‑by‑step commands to create, list, and delete users and roles while highlighting cross‑data‑center visibility constraints and common errors.

CQLCassandraDistributed Database
0 likes · 12 min read
Understanding User and Role Management in Cassandra Clusters Across Data Centers
IT Services Circle
IT Services Circle
Aug 5, 2022 · Information Security

Designing Permission Systems: Overview of ACL, DAC, MAC, ABAC, and RBAC Models

This article explains the fundamentals of permission system design, introducing five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical implementation considerations such as role hierarchy, constraints, and data permissions.

ABACRBACaccess control
0 likes · 15 min read
Designing Permission Systems: Overview of ACL, DAC, MAC, ABAC, and RBAC Models
Laiye Technology Team
Laiye Technology Team
Nov 6, 2020 · R&D Management

How to Build Awesome Teams Without Bullshit – Stages, Roles, and Hiring Strategies

This article explains how companies at different development stages can identify talent needs, interview and hire the right people, and organize work to create truly efficient, non‑bullshit teams by mapping project phases, defining role levels and categories, and offering practical leadership and hiring advice.

HRleadershiprole management
0 likes · 27 min read
How to Build Awesome Teams Without Bullshit – Stages, Roles, and Hiring Strategies
DevOps Cloud Academy
DevOps Cloud Academy
Aug 16, 2019 · Operations

Automating Jenkins User and Role Management with Python Scripts

This guide demonstrates how to create Jenkins roles, authorize plugin APIs, and automate user creation and role assignment using Python scripts and HTTP POST requests, including sample code for creating accounts, granting roles, and managing a list of users via a parameterized Jenkins job.

JenkinsPythonautomation
0 likes · 4 min read
Automating Jenkins User and Role Management with Python Scripts
Java Captain
Java Captain
Jun 21, 2019 · Information Security

Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks

This article explores the concept of permissions, distinguishes their noun and verb attributes, outlines minimal‑privilege and data‑abstraction principles, examines server‑side versus client‑side access control, discusses role‑based access control and table design, and compares common Java security frameworks.

RBACaccess controlinformation security
0 likes · 11 min read
Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks
Java Captain
Java Captain
Jun 3, 2019 · Information Security

Designing Role-Based Access Control and Permission Data Model

This article explains the fundamentals of role‑based access control, how roles and permissions are structured, the use of user groups to simplify large‑scale authorizations, and presents a comprehensive database schema—including tables for users, roles, permissions, resources, and logs—to support flexible and extensible permission management.

Database DesignRBACaccess control
0 likes · 6 min read
Designing Role-Based Access Control and Permission Data Model
Youzan Coder
Youzan Coder
Mar 16, 2018 · Information Security

Design and Implementation of the SAM Permission System for Retail Platforms

Youzan’s SAM permission system implements a scalable RBAC framework for its Retail platform—using binary‑encoded permission bits, micro‑service architecture, and unified menu/API checks—to flexibly assign and verify roles across PC, App, Pad, and future custom‑role scenarios, enhancing operational efficiency and security.

MicroservicesPermission SystemRBAC
0 likes · 23 min read
Design and Implementation of the SAM Permission System for Retail Platforms