Externalized Security Policy Management
Group items matching
in title, tags, annotations or url
6More
The New RBAC: Resource-Based Access Control | Stormpath - 0 views
42More
Access control - Wikipedia, the free encyclopedia - 0 views
-
In any access control model, the entities that can perform actions in the system are called subjects, and the entities representing resources to which access may need to be controlled are called objects
- ...39 more annotations...
-
Both capability-based and ACL-based models have mechanisms to allow access rights to be granted to all members of a group of subjects (often the group is itself modeled as a subject)
-
identification and authentication determine who can log on to a system, and the association of users with the software subjects that they are able to control as a result of logging in; authorization determines what a subject can do; accountability identifies what a subject (or all subjects associated with a user) did.
-
Discretionary access control (DAC) is a policy determined by the owner of an object. The owner decides who is allowed to access the object and what privileges they have.
-
Management is often simplified (over what can be required) if the information can be protected using
Role Based Access Control and Role Based Security - 0 views
csrc.nist.gov/rbac
security authorization RBAC RoleBasedAccessControl ABAC AttributeBasedAccessControl NIST

30More
Authorization | Apache Shiro - 0 views
-
use the PermissionResolver to convert the string into a Permission instance, and perform the check that way
- ...26 more annotations...
-
delegates to the application's SecurityManager by calling the securityManager's nearly identical respective hasRole*, checkRole*, isPermitted*, or checkPermission* method variants
-
relays/delegates to its internal org.apache.shiro.authz.Authorizer instance by calling the authorizer's respective hasRole*, checkRole*, isPermitted*, or checkPermission* method
-
Implicit Roles:
-
key difference with a RolePermissionResolver however is that the input String is a role name, and not a permission string.
-
RolePermissionResolver has the ability to represent Permission instances needed by a Realm to perform permission checks.
-
globalRolePermissionResolver = com.foo.bar.authz.MyPermissionResolver ... securityManager.authorizer.rolePermissionResolver = $globalRolePermissionResolver