Alen Demirovicdevopsengage.com路Nov 13, 2023Fine-Grained Access Control: Building Custom Roles in Azure via TerraformWhen it comes to Azure roles, I need to mention early days of Azure, when access was governed by three roles: Account Administrator, Service Administrator, and Co-Administrator. Over time, Azure introduced a more modern approach to role management th...Discuss路40 readsAzure
Fahim Hasnain Fahadfahadfahim13.hashnode.dev路Nov 7, 2023Role Based Access Control (RBAC) - Basic Idea for developersRole Based Access Control (RBAC) is standard practice for any project where we have multiple types of users and their actions differ based on their permissions. It all depends on the requirements of how you design your RBAC system but from my previou...Discussrbac
Saurabh Adhaudevopsvoyager.hashnode.dev路Nov 2, 2023馃殌 Mastering Kubernetes Role Based Access Control (RBAC): A Comprehensive Guide to Access Control 馃攼馃摎Kubernetes is the rocket fuel for your containerized applications! But wait, it鈥檚 not all about deployment and scaling. The security of your Kubernetes cluster is a top priority, and that鈥檚 where Role-Based Access Control (RBAC) comes to the rescue. ...Discuss路20 likesKubernetesKubernetes
Seyed Aliseyedali.hashnode.dev路Jul 14, 2023Implementing JWT In Spring Boot 3Introduction Web applications require authentication and authorization to ensure that only authorized users have access to certain resources and functionality. JWT (JSON Web Token) is a popular authentication mechanism that allows the client to authe...Discuss路45 readsSpringboot
Delwar Ahmeddelwar.hashnode.dev路Jun 25, 2023Role based authenticationRole-based authentication is a commonly used approach to control access to different parts of an application based on the roles assigned to individual users. It provides a granular level of access control and ensures that users can only perform actio...DiscussBackend Development - Learning Checklistauthentication
Goodycybgoodycyb.hashnode.dev路Jun 3, 2023Implementing Role Based Access Control with GCP IAMOverview of GCP IAM Roles INTRODUCTION IAM roles consist of a collection of permissions that enable users assigned to those roles to carry out specific actions on particular cloud resources. These roles provide administrators with the ability to prec...Discuss路38 readsPractical Cl鉀卍 Security LabsGCP DevOps
venkat ssaladi.hashnode.dev路Mar 8, 2023Best practices for using IAM roles and policies in AWSLeast privilege access: Follow the principle of least privilege, which means granting users and services the minimum set of permissions needed to perform their job functions. This approach reduces the risk of accidental or malicious actions that coul...DiscussAWS IAM
Rajganesh Panduranganblog.bhuvanpati.com路Jan 12, 2023Scenario 1 - EC2 Access to S3 using IAM RoleScenario: An application running on an Amazon EC2 instance needs to access an Amazon S3 bucket to read and write files. However, you do not want to hardcode the AWS access key and secret access key in the EC2 instance. Solution: You can use an IAM ro...Discuss路11 likes路104 readsIAM ScenariosAWS
Bishal DasforKubesimplifyblog.kubesimplify.com路Dec 12, 2022Kubernetes Access Control with Authentication, Authorization & Admission ControlHey! are you using kubernetes? Have you ever wondered how a simple request you make, as a user gives you access to various Kubernetes objects like pods and deployments? "Access control", thats how everything works! 馃 In this blog, lets learn what ac...Saiyam Pathak and 4 others are discussing this5 people are discussing thisDiscuss路79 likes路2.7K readsKubernetes
Sudip Senguptassengupta3.hashnode.dev路Sep 21, 2022Securing Modern Systems With Access Control ListsAccess control in cyber security is a crucial mechanism that helps mitigate the risk of a malicious actor retrieving data or viewing resources without proper authorization. Besides controlling access to data, controlling access techniques also enable...Discuss路69 reads#cybersecurity