Antoine LOIZEAUblog.smartcloudarchitect.fr·Oct 30, 2024Ajouter des permissions "Mail.Send" de la Graph API à une identité managéeQu’est qu’une Identité managée ? Une identité managée sur Azure (Managed Identity) est un service fourni par Microsoft Azure pour simplifier la gestion des identités dans les applications déployées sur Azure. Une identité managée permet à vos applica...Discuss·61 readsAzureGraphAPI
Eda Lökoğluedalkoglu.hashnode.dev·Oct 21, 2024MacOS Permisson Hatası Nasıl Çözülür?**MacOS’te izinlerle ilgili hatalar genellikle dosya veya klasörlere erişimle, bir uygulamanın belirli sistem kaynaklarına erişim izni güvenlik ve gizlilik ayarlarıyla ilgili olabilir. İzinler ilgili hata alıyorsanız bu adımları izleyip, uygulayabili...DiscussmacOS
Karan Datwanibackpackforlaravel.hashnode.dev·Oct 13, 2024Backpack - Configure User Access Control and Permissions in 10 minutesHey folks! So, picture this: you're crafting your admin panel and the need for proper access control hits you. Admin panels without roles and permissions are like a party without bouncers – chaos waiting to happen. It's like giving everyone backstage...DiscussLaravel
Chishtiya Shaikhchishtiyashaikh.hashnode.dev·Oct 12, 2024Getting Started with AWS IAM: Managing Users and PermissionsWhen it comes to securing your AWS environment, AWS Identity and Access Management (IAM)is your first line of defense. Whether you're launching your personal cloud project 🛠️ or managing an entire organization’s AWS infrastructure 🏢, IAM empowers y...Discuss·32 readsAWS
Naushad Khannaushad-khan.hashnode.dev·Oct 11, 2024Day 6 : File Permissions and Access ControlHello everyone! On Day 6 of my #90DaysOfDevOps challenge, I learned about file permissions and access control lists (ACL) in Linux. These are crucial concepts for managing who can access and change files on a system. Here’s what I did today: What Are...Discuss·1 likeDevops
Aman Shaikhaman7.hashnode.dev·Sep 28, 2024AWS IAM for beginner'sThis is a core AWS service that helps us provide/control access to the AWS resources Resources are the entities that you create in AWS , e.g. S3 bucket , Lambda function, etc. Users attempt to perform action on this resources , e.g. Create S3 bucke...DiscussAWS IAM
Samuel Nwankwosaminwankwo.hashnode.dev·Sep 1, 2024Understanding Authentication vs. Authorization: What’s the Difference?You might have heard the terms authentication and authorization when dealing with online accounts or security settings. Although they sound similar, they mean different things. Let’s break them down in simple language so you can easily understand the...DiscussAPIs
mahpara jabbarmahparajabbar.hashnode.dev·Aug 26, 2024Manually Configuring IAM Permissions for EC2 and VPC ResourcesThis will guide us through the steps required to create custom IAM policies and attach them to users or roles to control access to various AWS resources, including EC2 instances and VPC components. To create and configure AWS IAM policies and roles t...Discussec2
Vibhuti Jainvibhutijain.hashnode.dev·Aug 20, 2024Day 6 Task: File Permissions and Access Control ListsFile Permissions - File permissions in Linux control who can read, write, or execute a file or directory. These permissions are crucial for maintaining the security and proper functioning of a system. Permission Types Each file and directory in Linux...Discusspermissions
Yilia LinforAPI7api7.hashnode.dev·Aug 16, 2024API7 Enterprise 3.2.14.4: Permission Boundary for Refined Permission ManagementAPI7 Enterprise v3.2.14.4 is officially released, featuring the introduction of the permission boundary to meet the need for more granular user permission management in enterprises. What Is a Permission Boundary? A permission boundary, as the name su...Discuss·11 likespermissions