Tag

Access Control

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
May 28, 2025 · Operations

Mastering Squid Proxy: Installation, Configuration, and Access Control on Linux

This guide walks you through Squid's features, how it works, hardware requirements, step‑by‑step installation, default and custom configuration, initialization, testing, and detailed ACL examples to control access and improve network performance on Linux systems.

Access ControlConfigurationInstallation
0 likes · 15 min read
Mastering Squid Proxy: Installation, Configuration, and Access Control on Linux
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Apr 16, 2025 · Information Security

Designing an Internet‑Facing Cloud Firewall: Architecture, Rules, and Future Plans

This article outlines the background, architectural design, implementation details, and future roadmap of an internet‑boundary cloud firewall built on DPDK, covering physical and software structures, traffic steering, rule matching logic, and planned enhancements such as logging and traffic analysis.

Access ControlDPDKVPC
0 likes · 6 min read
Designing an Internet‑Facing Cloud Firewall: Architecture, Rules, and Future Plans
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAccess ControlAuthorization
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Top Architect
Top Architect
Feb 15, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Mechanisms

The article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission scopes, implementing signature generation and verification, employing timestamps and nonces to prevent replay attacks, and outlining practical API endpoint specifications and response standards.

API securityAccess ControlAuthentication
0 likes · 33 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Mechanisms
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

Access ControlAuthorizationPermission Management
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
Selected Java Interview Questions
Selected Java Interview Questions
Nov 27, 2024 · Backend Development

Designing a Flexible Permission Control System with Java Annotations and Spring AOP

This article explains how to build a scalable, maintainable permission control framework in Java by defining custom annotations, designing relational database tables, and using Spring AOP to intercept method calls for organization‑level, personal, limit, and special‑role checks, while providing implementation details and best‑practice recommendations.

AOPAccess ControlAnnotations
0 likes · 21 min read
Designing a Flexible Permission Control System with Java Annotations and Spring AOP
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 20, 2024 · Information Security

Understanding Single Sign-On (SSO): Principles, Process, and Application Scenarios

This article explains the fundamentals, architecture, workflow, and practical scenarios of Single Sign-On (SSO), illustrating how a centralized authentication server enables users to log in once and seamlessly access multiple trusted applications, while also offering resources for deeper study.

Access ControlAuthenticationSSO
0 likes · 5 min read
Understanding Single Sign-On (SSO): Principles, Process, and Application Scenarios
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 18, 2024 · Frontend Development

Implementing Elegant 403 Pages in Admin Frameworks by Replacing Route Components

This article explains why many admin frameworks ignore 403 pages, compares common handling strategies, and presents a practical solution that replaces the component of unauthorized routes with a dedicated 403 component while preserving the original URL, complete with code examples and visual demos.

403 pageAccess ControlAdmin Framework
0 likes · 9 min read
Implementing Elegant 403 Pages in Admin Frameworks by Replacing Route Components
Efficient Ops
Efficient Ops
Nov 13, 2024 · Information Security

How Leading Companies Stop Insider Data Theft: Real Ops & Security Practices

This article compiles practical insights from Zhihu discussions and real‑world experience on preventing insider spying and tampering with databases, covering least‑privilege policies, mutual supervision, strict access controls, audit mechanisms, and cultural factors that shape effective information security operations.

Access Controlauditdatabase security
0 likes · 11 min read
How Leading Companies Stop Insider Data Theft: Real Ops & Security Practices
Selected Java Interview Questions
Selected Java Interview Questions
Sep 26, 2024 · Information Security

Understanding JWT Token Security: Threats and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay, and forgery, and presents practical measures—including HTTPS, encryption, secure storage, short lifetimes, two‑factor authentication, and safe token refresh—to protect token integrity in modern web applications.

Access ControlAuthenticationJWT
0 likes · 14 min read
Understanding JWT Token Security: Threats and Mitigation Strategies
php中文网 Courses
php中文网 Courses
Aug 27, 2024 · Backend Development

Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide

This article explains how Laravel's policy-based authorization works, covering policy creation, registration, usage in controllers and Blade, custom methods, response handling, guest user support, and testing, with full code examples for implementing secure and maintainable access control.

Access ControlAuthorizationGate
0 likes · 5 min read
Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide
Top Architect
Top Architect
Aug 25, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the concepts of role‑based access control (RBAC), compares RBAC models, shows how to configure permissions and user groups, and provides step‑by‑step code examples for integrating Spring Security with JWT, JSON login, password encryption and database authentication in Java backend applications.

Access ControlBackend DevelopmentJWT
0 likes · 20 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Top Architect
Top Architect
Aug 13, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including standard RBAC, role inheritance, constraints, user groups, organizations, and positions, and provides detailed database table designs for implementing an ideal RBAC system in complex enterprises.

Access ControlPermission ManagementRBAC
0 likes · 20 min read
Understanding Permission Management and RBAC Models
Top Architect
Top Architect
Jul 30, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure Spring Security for in‑memory and JWT‑based authentication, and provides complete Java code examples for permissions, user groups, password encryption, and custom login filters.

Access ControlAuthenticationJWT
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
macrozheng
macrozheng
Jul 4, 2024 · Information Security

Mastering Access Control: 5 Core Permission Models and Practical RBAC Design

This article explains the fundamentals of access control by reviewing five major permission models—ACL, DAC, MAC, ABAC, and RBAC—then dives into RBAC extensions and practical guidelines for designing user, role, and permission management in real‑world systems, covering menu, operation, and data-level controls.

Access ControlAuthorizationRBAC
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models and Practical RBAC Design
Top Architect
Top Architect
Jun 12, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model classifications, permission concepts, and user‑group usage, then demonstrates how to implement RBAC in a Spring Security application, including in‑memory authentication, JWT integration, JSON login, and password encryption techniques.

Access ControlAuthenticationJWT
0 likes · 17 min read
Understanding RBAC and Implementing Spring Security with JWT
DataFunTalk
DataFunTalk
May 19, 2024 · Big Data

Tencent's Multi-Engine Unified Metadata and Permission Management for Big Data

This article introduces Tencent's Big Data Processing Suite (TBDS), discusses challenges of data silos, and presents Gravitino's open‑source unified metadata service and permission model, detailing how it integrates Hadoop, MPP, and various catalog plugins to provide consistent access control across heterogeneous data platforms.

Access ControlBig DataData Lake
0 likes · 12 min read
Tencent's Multi-Engine Unified Metadata and Permission Management for Big Data
Architect's Guide
Architect's Guide
May 19, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the fundamentals of role‑based access control (RBAC), its model variants, and user‑group usage, then demonstrates how to configure Spring Security with in‑memory authentication, integrate JWT for stateless token‑based authentication, customize JSON login, and securely encrypt passwords using BCrypt.

Access ControlAuthenticationJWT
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Architects Research Society
Architects Research Society
May 6, 2024 · Information Security

Hierarchical Security Model: Manager and Position Hierarchies in Microsoft Dataverse

This article explains how the hierarchical security model in Microsoft Dataverse extends existing security mechanisms by introducing manager and position hierarchies, details their configuration, access rules, performance tips, and how to include or exclude records of disabled users.

Access ControlMicrosoft Dataversehierarchical security
0 likes · 14 min read
Hierarchical Security Model: Manager and Position Hierarchies in Microsoft Dataverse