Questions tagged [rbac]

RBAC is short for Role Based Access Control, an authorization and access control model in which access to restricted resources is granted or denied based on whether the requester's identity is associated with one or more role classifications required by the restricted resource.

Traditionally, security systems have often been structured to specify which individuals are allowed to access each restricted resource. As the number of restricted resources and number of individuals grows, this quickly becomes difficult to administer. When a person leaves the organization or joins the organization, the person must be removed from or added to all the relevant access control lists.

In Role Based Access Control, a level of abstraction in inserted between the restricted resource and the identities permitted to use that resource. A role descriptor is defined, typically aligned with job function (operator, manager, etc). The role descriptor is added to the access control list of the restricted resources. Individual identities are associated with or tagged with the role descriptor. When access to a restricted resource is requested, access can be granted by checking to see if the requesting identity is associated with one or more of the role definitions permitted to access the resource.

In this configuration, the number of role descriptors is relatively small even when there are a large number of users or resources involved, making the overall system easier to manage and administer than direct-reference access control lists.

1107 questions
-1
votes
1 answer

Yii 2 RBAC Exception 'yii\base\UnknownMethodException' with message 'Calling unknown method: yii\rbac\DbManager::getItem()'

I was trying to create a console command for yii 2 rbac I'm getting exception: 'yii\base\UnknownMethodException' with message 'Calling unknown method: yii\rbac\DbManager::getItem()' protected function…
Vampire
  • 3
  • 4
-1
votes
1 answer

Standalone rbac setup for module yii2

I`ve got two modules in my yii2-basic application. For common users I have "user" table and for superadmin users I have the second "superadmin" table. There are two users with different sessions in my app - users and superadmins. I need to use…
Daniil Andashev
  • 154
  • 1
  • 9
-1
votes
2 answers

How to implement RBAC (Role Based Access Control) in ASP.NET web forms?

I found this great article on how to implement RBAC (Role Based Access Control) in ASP.NET MVC. How can I implement it in an existing ASP.NET web forms application?
user7792598
  • 177
  • 1
  • 6
  • 17
-1
votes
1 answer

Yii2 Rbac (DbManager)- return null

Yii::$app->user->can('do_all') return null when i enter by my user (in db only 1 user). What i did wrong. 1)- I created 4 tables. auth_asignment: item_name => do_all, user_id => 1 auth_item: name => do_all, type => 1 auth_item_child:…
-1
votes
1 answer

Cannot insert the value NULL into column 'user_id', table 'dbo.role_user'; column does not allow nulls

I am using Zizaco/Entrust in Laravel 5.0 to apply RBAC and i'm having the following error: Cannot insert the value NULL into column 'user_id', table 'dbo.role_user'; column does not allow nulls. INSERT fails. (SQL: insert into [role_user]…
xhulio
  • 1,093
  • 1
  • 13
  • 32
-1
votes
3 answers

Generating a list of permissions

I'm working on a custom framework strictly for fun and educational purposes. I've read over this question on how to implement permissions and I like the answers; either using a decorator pattern and / or checking permissions based on the URL from a…
mister martin
  • 6,197
  • 4
  • 30
  • 63
-1
votes
1 answer

Xacml in tinyOS

I have to implement an rbac in mica motes. I've read that Xacml helps in implementation of rbac. But I searched tutorials and google and I'm not able to find anything relevant.Can some one please explain how it should be done or any lead to…
-2
votes
1 answer

What are Kubernetes Users for?

I'm studying Kubernetes now, and have a question about Kubernetes Users. I learned how to create Users and how to limit access by Role, but when should I use it? For example, if a malicious user (not a k8s user, but an operating user) penetrates…
altblanc
  • 69
  • 1
  • 9
-2
votes
2 answers

How to restrict default Service account from creating/deleting kubernetes resources

I am using Google cloud's GKE for my kubernetes operations. I am trying to restrict access to the users that access the clusters using command line. I have applied IAM roles in Google cloud and given view role to the Service accounts and users. It…
Badmaash
  • 29
  • 3
-2
votes
1 answer

AWS Feature based licensing

I am designing a product which would be deployed to AWS. It will use Cognito for user authentication. It will be a multi-tenant application. The application has many modules/features. The pricing depends on the features selected by the…
-3
votes
1 answer

I have an RBAC problem, but everything I test seems ok?

This is a continuation of the problem described here (How do I fix a role-based problem when my role appears to have the correct permissions?) I have done much more testing and still do not understand the error Error from server (Forbidden): pods is…
user3877654
  • 1,045
  • 1
  • 16
  • 40
1 2 3
73
74