Wiki

Articles tagged with "authorization", sorted by date (updated)X
Displaying 1-5 of 5 result(s).

Yii User and Rights Implementation

Updated about a year ago by Rajith RHow-tos12 comments – viewed 22,352 times – ( +7 / -7 ) – version 1.1
implementing some features of yii user and rights.

How to write secure Yii applications

Updated about a year ago by Fran├žois GannazHow-tos20 comments – viewed 194,756 times – ( +105 ) – version 1.1
warning: While this security guide tries to be quite complete, is not exhaustive. If security matters for you, you ought to check several other references.

Simple authorization system

Updated 2 years ago by GustavoHow-tos1 comment – viewed 26,938 times – ( +16 ) – version 1.1
How to create a simple (non-RBAC) authorization system

Implementing a Flat User Access System

Updated 2 years ago by TrejderHow-tos1 comment – viewed 9,148 times – ( +9 ) – version 1.1
This article shows a quick and easy way to implement flat user access control system. Flat means, that user access is controlled by level only, which is solution exactly opposite to complex RBAC access systems.

ACL and RBAC

Updated 3 years ago by kevinkorbHow-tos0 comments – viewed 15,401 times – version 1.1
This HowTo assumes that you have a smattering of ACL in general and of how the acl-extension works basically. It will introduce you into the abstract and give you a hint on how to use Business-Rules. If you have in-depth questions, please refer to the extension documentation. Using ACL in an RBAC-manner cannot and should never obscure the fact that the underlying system is still ACL-based. In fact, the Business-Rules are just another layer in the permission-check plan.