Articles tagged with "authorization", sorted by date (updated)X
Displaying 1-5 of 5 result(s).

Yii User and Rights Implementation

Updated 3 years ago by Rajith RHow-tos12 comments – viewed 28,365 times – ( +7 / -8 ) – version 1.1
implementing some features of yii user and rights.

How to write secure Yii applications

Updated 4 years ago by François GannazHow-tos20 comments – viewed 246,496 times – ( +108 / -1 ) – version 1.1
warning: While this security guide tries to be quite complete, is not exhaustive. If security matters for you, you ought to check several other references.

Simple authorization system

Updated 4 years ago by GustavoHow-tos1 comment – viewed 35,356 times – ( +16 / -1 ) – version 1.1
How to create a simple (non-RBAC) authorization system

Implementing a Flat User Access System

Updated 4 years ago by TrejderHow-tos1 comment – viewed 11,936 times – ( +9 / -1 ) – version 1.1
This article shows a quick and easy way to implement flat user access control system. Flat means, that user access is controlled by level only, which is solution exactly opposite to complex RBAC access systems.


Updated 5 years ago by kevinkorbHow-tos0 comments – viewed 19,917 times – ( -1 ) – version 1.1
This HowTo assumes that you have a smattering of ACL in general and of how the acl-extension works basically. It will introduce you into the abstract and give you a hint on how to use Business-Rules. If you have in-depth questions, please refer to the extension documentation. Using ACL in an RBAC-manner cannot and should never obscure the fact that the underlying system is still ACL-based. In fact, the Business-Rules are just another layer in the permission-check plan.