Karan Datwanibackpackforlaravel.hashnode.dev·Oct 13, 2024Backpack - Configure User Access Control and Permissions in 10 minutesHey folks! So, picture this: you're crafting your admin panel and the need for proper access control hits you. Admin panels without roles and permissions are like a party without bouncers – chaos waiting to happen. It's like giving everyone backstage...DiscussLaravel
Chioma Ibeakanmachiomaibeakanma.hashnode.dev·Sep 7, 2024Unauthorized Privilege Escalation Vulnerability via Role ManipulationPrivilege escalation vulnerabilities pose a serious threat in many applications, allowing unauthorized users to gain access to higher-level permissions. One such vulnerability is "Unauthorized Privilege Escalation via Role Manipulation." This issue a...Discuss·39 readsVulnerabilities with Chioma Ibeakanmarole-based-access-control
Vanessa VillaforPangea Blogpangea.cloud·Sep 4, 2024RBAC vs ReBAC vs ABAC: Comparison and Guide on how to get startedWhat is authorization (AuthZ)? Authorization is a cornerstone of enterprise security. It dictates who can access specific resources, what actions they can perform, when, and the authorization logic can be as rigorous as to include attributes such as ...Discuss·220 readsauthorization
Aniket Kurkuteaniket-kurkute.hashnode.dev·Aug 24, 2024Kubernetes RBACRole-Based Access Control (RBAC) is a way in which we can regulate the access to a resource, based on the roles assigned to users, and groups in the organization. The RBAC API has 4 kinds of k8s objects: Role ClusterRole RoleBinding ClusterRoleBi...Discuss#ClusterManagement
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 10, 2024Prisma Cloud: Your Ulimate Tool for Securing Multi-Cloud EnvironmentsAs cloud environments grow in complexity, the need for a unified, robust security platform becomes paramount. Prisma Cloud by Palo Alto Networks stands out as a comprehensive solution designed to secure multi-cloud infrastructures across AWS, GCP, ...Discuss·1 likeprisma cloud
Foluso Ogunsakinnotonprem.hashnode.dev·Jul 29, 2024Navigating NACLs and Security Groups for Session Manager Connectivity in AWSI frequently create and manage EC2 instances in AWS. While there are multiple ways to access these instances, connecting via AWS Systems Manager (SSM) Session Manager is my preferred method for its secure seamlessness. However, setting up the session...Mojisola Beckley and 1 other are discussing this2 people are discussing thisDiscuss·32 likes·75 readsnetworking
Rakshita Belwalbelwalrakshita08.hashnode.dev·Jul 22, 2024DAY 6: Understanding Access Control Lists (ACL's) and Special File Permissions in LinuxWhat is ACL? Access control list (ACL) provides an additional, more flexible permission mechanism for file systems. ACLs allow you to define different permissions for different users or groups beyond the standard owner/group/others model. Using 'getf...Discuss#90daysofdevops
Sahil Mhatreequinox.hashnode.dev·Jul 14, 2024A Guide to Linux Permissions and Advanced ACLUnderstanding File Permissions: Creating and Viewing File Details Create a Simple File: Use touch filename to create a file. View File Details: Run ls -l to see detailed information about files, including permissions. File Permission Categori...Discuss·1 likeDevops
Yilia LinforAPI7api7.hashnode.dev·Jul 12, 2024What's New in API7 Enterprise: IAM for Granular Access ControlIntroduction Previous versions of API7 Enterprise provided a simple, user-friendly, and comprehensive RBAC (Role-Based Access Control) management mechanism. This mechanism ensured system security while granting users flexible role permission configur...Discuss·10 likesrbac
Alpit Kumaralpit.hashnode.dev·Jul 10, 2024Access Tokens V/S Refresh TokensTo make it more easy to Understand, I am using example of login functionality which is used in many cases. Logging In : When you log into a web application, the server verifies your credentials after successfully authentication, the server sends yo...Discussbackend