Author | Topic: Role Based Access Control? | |
---|---|---|
Stephen Bryan | Role Based Access Control? on Wed, 01 Apr 2015 10:23:44 -0400 In a post a about string encryption little over 3 years ago, Andreas Herdt wrote "One additional thing: One of the next previews will include an implementation of a "Role Based Access Control" (RBAC) system. Insofar you will get everything ready to use out of the box." Has this been implemented? If so is it somewhere in the documentation? Stephen | |
Steffen F. Pirsig | Re: Role Based Access Control? on Wed, 29 Apr 2015 20:53:35 +0200 Dear Mr. Bryan, can you please elaborate a bit what you are awaiting from the RBAC system and how you would use it. In fact we have implemented for inhouse usage an RBAC which simple means there is an account mgmt class with a data model allowing us to handle useraccounts perform login and logout, associate roles to users, associate permissions to roles and in turn validate if a user has a specific permission. Btw. this RBAC implementation is driving the authentication and permission of our website and download center as well as the newsgroup and our internal systems. If thats what you want i can add a workitem to the team to release that internal used RBAC implementation as an isolated package with source code to be downloaded. Of course we can not give you any release date but you can assume it will be this year. regards Steffen F. Pirsig Alaska Software Inc. "Stephen Bryan" schrieb im Newsbeitrag news:5e54c649$46d09756$167893@news.alaska-software.com... In a post a about string encryption little over 3 years ago, Andreas Herdt wrote "One additional thing: One of the next previews will include an implementation of a "Role Based Access Control" (RBAC) system. Insofar you will get everything ready to use out of the box." Has this been implemented? If so is it somewhere in the documentation? Stephen | |
Stephen Bryan | Re: Role Based Access Control? on Mon, 04 May 2015 07:59:18 -0400 Greetings Steffen, My need was for exactly what you described, user authentication and permissions for a /CXP web application. For now I've worked around it but at some point I would like to rewrite and implement something a little more secure. Stephen Bryan "Steffen F. Pirsig" wrote in message news:259b6344$7c4b3c1d$9e792@news.alaska-software.com... Dear Mr. Bryan, can you please elaborate a bit what you are awaiting from the RBAC system and how you would use it. In fact we have implemented for inhouse usage an RBAC which simple means there is an account mgmt class with a data model allowing us to handle useraccounts perform login and logout, associate roles to users, associate permissions to roles and in turn validate if a user has a specific permission. Btw. this RBAC implementation is driving the authentication and permission of our website and download center as well as the newsgroup and our internal systems. If thats what you want i can add a workitem to the team to release that internal used RBAC implementation as an isolated package with source code to be downloaded. Of course we can not give you any release date but you can assume it will be this year. regards Steffen F. Pirsig Alaska Software Inc. "Stephen Bryan" schrieb im Newsbeitrag news:5e54c649$46d09756$167893@news.alaska-software.com... In a post a about string encryption little over 3 years ago, Andreas Herdt wrote "One additional thing: One of the next previews will include an implementation of a "Role Based Access Control" (RBAC) system. Insofar you will get everything ready to use out of the box." Has this been implemented? If so is it somewhere in the documentation? Stephen |