Skip to main content

Questions tagged [access-control]

Filter by
Sorted by
Tagged with
3 votes
1 answer
699 views

I’m trying to clarify the difference between Role-based Access Control, Policy-based Access Control, and Access Control List when designing an authorization system. I have two scenarios: Scenario A I ...
Meitaiyang's user avatar
-1 votes
2 answers
234 views

We have a REST api endpoints that return collections of objects where users could perform different types of actions on those objects. We need it to turn on/off different UI options based on that ...
tlt's user avatar
  • 123
-2 votes
1 answer
648 views

I am refactoring an old application which has about 200 user permissions. Based on access permissions for the user, menu items for webpages will be Enabled or not. Permissions are also checked on the ...
Daniel Gee's user avatar
0 votes
2 answers
291 views

We have an ongoing argument in our team. Please help. Here is the problem: In our SPA web app, let's say we have a resource which can be edited by only those users who belong to the team of the user ...
user3563059's user avatar
3 votes
1 answer
2k views

I am newbie at these stuff and while I was able to distinguish between role-based vs. policy-based authorization models, I can't seem to understand whether there is one between policy-based vs. ...
mlst's user avatar
  • 141
2 votes
1 answer
658 views

I am debating whether to give my files a public url or a limited private one. I am hosting various files for a mobile/web application. These will include product images and videos. Currently only ...
auerbachb's user avatar
  • 191
0 votes
1 answer
87 views

I have role based access control to my applications. I have team leader application where team leader with valid role can view their teams performance metrics. Now my top management wants to get a ...
tamilgirl's user avatar
9 votes
4 answers
4k views

I've got a project with an HTTP API which returns data from a database. The layers it goes through to get to the API look like this: DB -> Repository -> Controller I'm looking to restrict the ...
Joundill's user avatar
  • 149
1 vote
0 answers
90 views

There are different kinds of ACLs I've generally implemented: Does a user have access to a resourcetype(API)? Does a user have access to a resource(Object)? Does a resource have access to another ...
Amit Ambasta's user avatar
-1 votes
1 answer
578 views

We have many clients which, upon start up, request a specific resource on the server using an HTTP API (not RESTful). This resource is - currently, identical for all clients. Naturally, since the ...
user991710's user avatar
2 votes
2 answers
3k views

I would like to introduce permissions based access control in my Single Page Application (SPA) front-end which authenticates the user with token based authentication (JWT). Permission Requirement: ...
panda's user avatar
  • 171
3 votes
2 answers
519 views

I hope this is the correct SE site for this kind of question. My team is currently developing an application which IMO needs access control beyond RBAC. Users can have access rights to entities based ...
Christoph Grimmer's user avatar
-1 votes
3 answers
451 views

My question is how I can achieve more encapsulation in TypeScript. I have a class Item, with a public setter isOwned, but I only want to call this method in specific situations: if the item is picked ...
chharvey's user avatar
  • 264
27 votes
6 answers
8k views

I am creating an API strcutured web application and in this application we have different layers which are doing their own job. First layer is Validation layer which validate user input and if it ...
Muhammad's user avatar
  • 399
2 votes
1 answer
732 views

I am creating a brand new Housing application which lets user rate or favourite the houses. The following are users of the application: Owner Agent Guest (not logged in) Visitor (logged in) Tenant Now,...
CodeYogi's user avatar
  • 2,186
4 votes
2 answers
149 views

We're currently working on upgrading a small information system for an enterprise. Currently, the system has a corporate network zone (CORP) where services for internal users are placed, and a data ...
NLuburić's user avatar
  • 191
20 votes
1 answer
6k views

When reading about ACL and RBAC I seem to understand it easily - there are either usernames or roles that are given access to an asset. I can also see how I could implementing those. i.e. this image ...
Dennis's user avatar
  • 8,267
-1 votes
2 answers
199 views

I am following the rbac model in my system. I want to know if I should prepopulate the resources and permissions table? I have resources like contracts, contract_drafts, SLA (service level agreement)...
imran.razak's user avatar
31 votes
2 answers
48k views

I am trying to follow the role bases access control model to restrict what users can or cannot do in my system. So far I have the following entities: users - People who will use the system. Here I ...
imran.razak's user avatar
1 vote
2 answers
352 views

I'm working on the creation of a software and product documentation in a wiki format. It will include the documentation for all the company products. After some research, we decided to use the ...
James's user avatar
  • 171
0 votes
2 answers
111 views

I am trying to implement a tree data structure that callers of my code edit for me to operate on. The idea is that the caller can hold a reference to nodes from the tree and modify their data (both ...
Wasabi Fan's user avatar
3 votes
1 answer
190 views

I have a bunch of REST webservices that my client uses. For instance, to create a user, I have POST /users and to modify it POST /users/{id} The problem is, some fields, as marketArea, are allowed ...
user3748908's user avatar
  • 1,667
2 votes
1 answer
842 views

I am looking for a viable design/architecture pattern for securing several web applications. Here is the situation: Multiple web applications must enforce roles and permissions at Java service method ...
senseiwu's user avatar
  • 668
1 vote
1 answer
219 views

I am developing an application using Angular and REST API and I'm facing a problem concerning user access right. The application runs this way: A user signup The same user creates his organization He ...
Thomas thomas's user avatar
1 vote
2 answers
1k views

What is the best way to tell if a user is already logged in when accessing the page? I have seen many people talk about a Recognition service that will validate a user trying to login, but what about ...
Katrina's user avatar
  • 211