Questions tagged [role-based-access-control]
155 questions
0
votes
1 answer
Control Access to Microsoft Azure Account
Our company has a Microsoft Azure account (Pay-As-You-Go).
We had a programmer that developed our web app. We gave him full access to our Azure account. So, he had access to everything.
We intend to hire another developer to make modifications to…

MarHutchy
- 11
- 5
0
votes
1 answer
Pass security context when executing query in mongo db
I have a requirement to apply some rules to the collection used for searching and also to the returned docs based on userid and/or role of the caller in mongo db.
I see mongodb provides support to create one or more users internally and use them to…

user6594900
- 33
- 1
- 4
0
votes
1 answer
Restrict access to jenkins user
We are using Jenkins Role based strategy to give permissions. My QA is given permission build and cancel jobs at global roles. I have created project role with matching pattern to give him access to deploy on QA environment. But Because of global…

aspire96
- 141
- 2
- 11
0
votes
1 answer
JHipster Role based masking of certain columns
In a JHipster based project, we need to selectively filter out certain columns based on role/user logged in. All users will be able to view/modify most of the columns, but only some privileged users will be able to view/modify certain secure…

user1880957
- 1,146
- 3
- 15
- 29
0
votes
1 answer
Role-based access control used in MS Access
I am currently working on a project were one of the requirements are to use the users windows login as their login for MS Access, where they would then click there role to gain access into the system. I have never done this before but I have set up…

Orange56
- 119
- 7
0
votes
0 answers
What is the difference between Extended Role Based Access Control(Ex-RBAC) and Role Based Access Control(RBAC)?
What is the difference between each, and when should I choose one over the other? Are there situations where these should be merged?
Can you explain with an example which one is better and why?
Thanks in advance.

KNV Srinivas
- 61
- 2
- 10
0
votes
0 answers
Role-Based Security in Windows desktop and web application
I have been tasked with researching role-based security technology for possible inclusion in our .Net based desktop and web applications. I envision sending a service the security credentials of the application user and receiving back a…

user481779
- 1,071
- 2
- 14
- 28
0
votes
1 answer
Is "view as someone else" recommended from the software design perspective?
Some time ago, Facebook introduced a feature that helps set up the permissions on ones profile: view as someone else. It allows the author of a dynamic page to see which user groups (or specific users) can see which information in the page, and…

texnic
- 3,959
- 4
- 42
- 75
0
votes
1 answer
CouchDB per app role based security
Is there anyway to have a Role Based Access Control user management mechanism for a javascript app that uses couchDb as the database backend?
According to what I have been looking into, when it comes to security all the talks are about setting up…

Behrooz
- 1,895
- 4
- 31
- 47
0
votes
1 answer
Yii2 Access Rules Using Different Models
I'm having trouble with Yii2 Role Based Access Control. In the usual set-up, the authentication rule takes place when the identity of the current user. Like written in the docs. Authorization
In my case, how can I set up the authorization (aside…
user5146984
0
votes
0 answers
Changing startup page of asp.net application based on the roles
I'm developing asp.net web application i'm using multiple roles in the application, the problem is with the start up page must change based on the role. for example consider we have 3 roles role1,role2,role3, and pages like page1,page2,page3. Now,…

jeya prakash M
- 13
- 4
0
votes
1 answer
Authorization Model: Context of Role?
I am currently attempting to design an Authorization Model that has the following components:
Privileges - an action that can either be granted or denied to a user/group
Roles - a collection of privileges; roles can be associated with a user or…

Mackers
- 1,039
- 8
- 21
0
votes
1 answer
Elasticsearch access control based on field value
I am currently investigating the ELK (Elasticsearch, Logstash, Kibana) stack for centralized log file analysis.
The plan is to store logs of multiple applications in the same Elasticsearch cluster using logstash and day-based indexes.
All documents…

Philipp
- 788
- 1
- 11
- 23
0
votes
1 answer
Is that a bad design for access control database?
I'm a simple system in PHP and codeigniter and need a simple but better way to manage users and their access to the system. So after some search I found interesting topics about access control but I'm still in doubt about if that's a good approach…

Ricardo Silva
- 1,221
- 9
- 19
0
votes
1 answer
RBAC system with two parameters
I’m looking for an example or best practices for a RBAC system with two parameters. Rather than simply having a user associated with a role, and that role associated with a group of permissions; a user can be associated with a role “for a specific…

jcropp
- 1,236
- 2
- 10
- 29