Articles tagged with "rbac", sorted by viewsX
Displaying 1-10 of 11 result(s).

Getting to Understand Hierarchical RBAC Scheme

Created 3 years ago by daemonsTutorials17 comments – viewed 70,382 times – ( +57 ) – version 1.1
Authentication and Authorization is a good tutorial. Among other topics, it describes basic aspects of Yii's RBAC implementation. But however hard I read the tutorial, I couldn't understand how exactly the hierarchy works. I found how to define authorization hierarchy, how business rules are evaluated, how to configure authManager, but almost nothing about how I should build my hierarchy, in what sequence its nodes are checked, when the checking process stops and what would be the checking result.

Introducción al control de acceso basado en roles (RBAC)

Created 3 years ago by Juan CalvoTutorials4 comments – viewed 35,010 times – ( +17 / -1 ) – version 1.1
Todos los que hemos empezado a utilizar Yii para crear aplicaciones Web, nos hemos dado de bruces cuando hemos intentado poner a funcionar el RBAC (acceso de control basado en roles).

Add information to Yii::app()->user by extending CWebUser (better version)

Created 3 years ago by emixTutorials4 comments – viewed 22,979 times – ( +5 / -1 ) – version 1.1
I found a better solution.
tags: Yii, user, rbac

CPhpAuthManager - how it works, and when to use it

Created 2 years ago by dckurushinHow-tos5 comments – viewed 18,432 times – ( +1 / -4 ) – version 1.1
Before reading this article, you should first learn this How to setup RBAC with a php file

Troubleshooting Rights Extension

Created 2 years ago by junxiongTips5 comments – viewed 17,379 times – ( +8 ) – version 1.1
Rights is one of user interface for Yii's Role Base Access Control extension. It is one of most downloaded extensions in Yii's Web.

How to use Expression in default AccessControl to allow only the owner to do some action

Created about a year ago by whatifHow-tos1 comment – viewed 12,998 times – ( +7 / -1 )
Hi Everyone


Created 2 years ago by zeroByteHow-tos0 comments – viewed 11,805 times – version 1.1
This HowTo assumes that you have a smattering of ACL in general and of how the acl-extension works basically. It will introduce you into the abstract and give you a hint on how to use Business-Rules. If you have in-depth questions, please refer to the extension documentation. Using ACL in an RBAC-manner cannot and should never obscure the fact that the underlying system is still ACL-based. In fact, the Business-Rules are just another layer in the permission-check plan.

Yet another implementation of CPhpAuthManager.

Created about a year ago by seenivasanHow-tos3 comments – viewed 7,754 times – ( +8 / -1 ) – version 1.1
In this wiki, I try to implement a simple authorization schema without putting much logic inside a file or into database table. We are constructing authorization hierarchy inside the controller. We are getting roles for the current user from database table and assigning only roles to user that are declared in the particular controller. We have brought down the work of loading of auth data at main application level to controller level. This way we have pulverised auth data for entire site into smaller units. Finally we are going to look at couple of examples.

How to use bizRules in standard accessControl filter

Created about a year ago by redguyHow-tos8 comments – viewed 7,631 times – ( +3 ) – version 1.1
I assume you are familiar with accessControl standard filter. It allows you to separate privileges to run some action from action code itself. There is however one problem with most common usage - you cannot use bizRules, at least based on some parameters passed to 'checkAccess' just because it is hard to pass them in accessRules() result.

Implementing a Flat User Access System

Created about a year ago by TrejderHow-tos1 comment – viewed 7,035 times – ( +9 ) – version 1.1
This article shows a quick and easy way to implement flat user access control system. Flat means, that user access is controlled by level only, which is solution exactly opposite to complex RBAC access systems.