Tanishka Marrottcloud-design-diaries.hashnode.dev·Oct 1, 2024How We Prevent Privilege Escalation with AWS IAM Permission Boundaries (A Practical DevOps Guide)In environments like ours, it’s crucial to strike a balance between DevOps flexibility and tight security controls. Imagine a scenario where DevOps members can create admin roles for team members—but, we need to ensure that these admins cannot furthe...Discuss·4 likespermission boundaries
Sai Krishna Gottipalliblog.10xsai.com·Sep 21, 2024Role-Based Access Control (RBAC) implementation in React: A Practical Guide - Part 2In our previous post, we discussed the backend implementation of Role-Based Access Control (RBAC). Now, let's dive into how we can implement RBAC in a React application. We'll focus on creating a flexible and maintainable system for managing user per...Discuss·1 likeRole Based Access Control (RBAC) - A practical guiderbac
Sai Krishna Gottipalliblog.10xsai.com·Sep 14, 2024Role-Based Access Control (RBAC): A Simple and Elegant Implementation - Part 1In today's digital landscape, securing access to resources is paramount. Role-Based Access Control (RBAC) is a powerful approach to managing user permissions efficiently. This blog post will guide you through implementing RBAC in a simple yet elegant...DiscussRole Based Access Control (RBAC) - A practical guiderole-based-access-control
Mohammad Imranimransaifi.hashnode.dev·Sep 13, 2024Step-by-Step Guide to Creating a Kubernetes User and Adding It to a Kubeconfig File (RBAC)Managing users in Kubernetes involves several key steps, from creating the user to configuring access via certificates and finally adding them to a kubeconfig file. In this detailed guide, we'll walk through the process of creating a user, generating...Discussrbac
Chioma Ibeakanmachiomaibeakanma.hashnode.dev·Sep 7, 2024Unauthorized Privilege Escalation Vulnerability via Role ManipulationPrivilege escalation vulnerabilities pose a serious threat in many applications, allowing unauthorized users to gain access to higher-level permissions. One such vulnerability is "Unauthorized Privilege Escalation via Role Manipulation." This issue a...Discuss·28 readsVulnerabilities with Chioma Ibeakanmarole-based-access-control
Dinesh Kumar Kblog.dineshcloud.in·Aug 5, 2024Jenkins Role-based Authorization StrategyJenkins, by default, provides a basic level of access control through its built-in security options, but for more granular control, you’ll need to use the Role-based Authorization Strategy plugin. This plugin allows you to define roles with specific ...DiscussDevOpsJenkins
vikash kumardevopswizard.hashnode.dev·Jul 21, 2024Kubernetes Security Simplified: Protecting with API Groups and RBACHey there, Kubernetes enthusiasts! 👋 Today, we're diving into some important security topics that will help you ace the Certified Kubernetes Administrator (CKA) exam and make you a Kubernetes security expert. We'll cover API Groups, Authorization, R...DiscussCKA journeyKubernetes Security Simplified
Amanpreet Singhblog.amanpreet.dev·Jul 10, 2024How to Implement Role-Based Access Control in NestJS with MongoDB - Part 2Introduction This post is the second in a series titled "Implement Role-Based Access Control in NestJS using MongoDB." In this series, we'll create an RBAC (Role-Based Access Control) app from scratch using NestJS and MongoDB. Whether you're a beginn...DiscussImplement Role-Based Access Control in NestJS using MongoDBMongoDB
Amanpreet Singhblog.amanpreet.dev·Jul 9, 2024How to Implement Role-Based Access Control in NestJS with MongoDB - Part 1Introduction This post is the first in a series titled "Implement Role-Based Access Control in NestJS using MongoDB." In this series, we'll dive into creating an RBAC (Role-Based Access Control) app from scratch using NestJS and MongoDB. Whether you'...Discuss·1 like·67 readsImplement Role-Based Access Control in NestJS using MongoDBnestjs
Stefan WeberProwithout.systems·Jul 5, 2024OutSystems Developer Cloud End-User Roles, Groups and Group MappingsIn this article, we examine a significant change from O11 to ODC regarding end-user roles and a pattern for managing roles across ODC applications using end-user groups and Identity Provider claims mapping (Group Mappings). For general information ab...Discuss·326 readsoutsystems