Wiki

Articles tagged with "rbac"X
Displaying 1-10 of 15 result(s).

Console Based CAuthManager Helper

Created 5 months ago by bluyellHow-tos1 comment – viewed 2,736 times – ( +1 ) – version 1.1
This behavior enable you to command the RBAC via console. This avoids you to install a entire rbac graphic toolkit to set up some rules in the rbac, maybe you are running inside a ssh console.

RBAC Super Simple with Admin and User

Created 9 months ago by evercodeTutorials9 comments – viewed 25,219 times – ( +10 / -3 ) – version 2.0
One of the common requests I see in the forum is how to implement RBAC. While you can implement Yii 2's built-in RBAC, that might be too much for developers who are just starting with Yii 2 or have simpler needs. Sometimes you are looking for a fast solution and just want two flavors, user and admin. And even if you will eventually need more, you can use these methods as a starting point for developing your own features or move on to Yii 2's RBAC.

MongoDB's RBAC support class extending BaseManager

Created 11 months ago by edoardo849How-tos1 comment – viewed 4,032 times – version 2.0
Here's a possible implementation for MongoDb of the RBAC standard. Create a class "MongoDbManager" in common\components and modify your params.php file like this:
tags: mongodb, rbac, yii2

Role Management

Created about a year ago by Dency G BHow-tos0 comments – viewed 6,591 times – ( +2 ) – version 2.0
Implementing a role based access control is a very easy process and you can even load your roles from the database if you want.
tags: rbac, yii2

shortcut/usefull access roles methods RBAC

Created about a year ago by Kostas Apazidis (KonApaz)Tutorials5 comments – viewed 3,639 times – ( +1 ) – version 1.1
These are functions that I used very often, may helps you!

How to use Expression in default AccessControl to allow only the owner to do some action

Created 2 years ago by whatifHow-tos2 comments – viewed 25,064 times – ( +8 / -1 ) – version 1.1
Hi Everyone

How to use bizRules in standard accessControl filter

Created 2 years ago by Maciej Li┼╝ewskiHow-tos8 comments – viewed 11,751 times – ( +3 ) – version 1.1
I assume you are familiar with accessControl standard filter. It allows you to separate privileges to run some action from action code itself. There is however one problem with most common usage - you cannot use bizRules, at least based on some parameters passed to 'checkAccess' just because it is hard to pass them in accessRules() result.

Yet another implementation of CPhpAuthManager.

Created 2 years ago by seenivasanHow-tos3 comments – viewed 9,796 times – ( +8 / -1 ) – version 1.1
In this wiki, I try to implement a simple authorization schema without putting much logic inside a file or into database table. We are constructing authorization hierarchy inside the controller. We are getting roles for the current user from database table and assigning only roles to user that are declared in the particular controller. We have brought down the work of loading of auth data at main application level to controller level. This way we have pulverised auth data for entire site into smaller units. Finally we are going to look at couple of examples.

Implementing a Flat User Access System

Created 2 years ago by TrejderHow-tos1 comment – viewed 9,115 times – ( +9 ) – version 1.1
This article shows a quick and easy way to implement flat user access control system. Flat means, that user access is controlled by level only, which is solution exactly opposite to complex RBAC access systems.

ACL and RBAC

Created 3 years ago by zeroByteHow-tos0 comments – viewed 15,350 times – version 1.1
This HowTo assumes that you have a smattering of ACL in general and of how the acl-extension works basically. It will introduce you into the abstract and give you a hint on how to use Business-Rules. If you have in-depth questions, please refer to the extension documentation. Using ACL in an RBAC-manner cannot and should never obscure the fact that the underlying system is still ACL-based. In fact, the Business-Rules are just another layer in the permission-check plan.