Tag

Role Inheritance

0 views collected around this technical thread.

Top Architect
Top Architect
Aug 13, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including standard RBAC, role inheritance, constraints, user groups, organizations, and positions, and provides detailed database table designs for implementing an ideal RBAC system in complex enterprises.

Access ControlPermission ManagementRBAC
0 likes · 20 min read
Understanding Permission Management and RBAC Models
Architect's Guide
Architect's Guide
May 6, 2024 · Information Security

Designing Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including basic RBAC, role inheritance, constrained RBAC, and how to combine them with user groups, organizations, and positions, and provides database table designs for both standard and ideal RBAC implementations.

Access ControlDatabase DesignPermission Management
0 likes · 15 min read
Designing Permission Management and RBAC Models
Top Architect
Top Architect
Aug 28, 2022 · Information Security

Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures

This article explains why permission management is essential for data security, introduces various permission models including basic RBAC, role inheritance, constrained RBAC, and discusses user grouping, organization‑based roles, and detailed database schema designs for both standard and ideal RBAC systems.

Access ControlInformation SecurityPermission Management
0 likes · 16 min read
Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures