Alaska Software Inc. - Role Based Access Control?
Username: Password:
AuthorTopic: Role Based Access Control?
Stephen BryanRole Based Access Control?
on Wed, 01 Apr 2015 10:23:44 -0400
In a post a about string encryption little over 3 years ago, Andreas Herdt 
wrote

"One additional thing: One of the next previews will include an 
implementation of
a "Role Based Access Control" (RBAC) system. Insofar you will get everything
ready to use out of the box."

Has this been implemented?
If so is it somewhere in the documentation?


Stephen
Steffen F. PirsigRe: Role Based Access Control?
on Wed, 29 Apr 2015 20:53:35 +0200
Dear Mr. Bryan,

can you please elaborate a bit what you are awaiting from the RBAC system 
and how you would use it.

In fact we have implemented for inhouse usage an RBAC which simple means 
there is an account mgmt class with a data model allowing us to handle 
useraccounts perform login and logout, associate roles to users, associate 
permissions to roles and in turn validate if a user has a specific 
permission.

Btw. this RBAC implementation is driving the authentication and permission 
of our website and download center as well as the newsgroup and our internal 
systems.

If thats what you want i can add a workitem to the team to release that 
internal used RBAC implementation as an isolated package with source code to 
be downloaded. Of course we can not give you any release date but you can 
assume it will be this year.

regards
Steffen F. Pirsig
Alaska Software Inc.


"Stephen Bryan"  schrieb im Newsbeitrag 
news:5e54c649$46d09756$167893@news.alaska-software.com...

In a post a about string encryption little over 3 years ago, Andreas Herdt
wrote

"One additional thing: One of the next previews will include an
implementation of
a "Role Based Access Control" (RBAC) system. Insofar you will get everything
ready to use out of the box."

Has this been implemented?
If so is it somewhere in the documentation?


Stephen
Stephen BryanRe: Role Based Access Control?
on Mon, 04 May 2015 07:59:18 -0400
Greetings Steffen,

My need was for exactly what you described, user authentication and 
permissions for a /CXP web application.
For now I've worked around it but at some point I would like to rewrite and 
implement something a little more secure.

Stephen Bryan




"Steffen F. Pirsig" wrote in message 
news:259b6344$7c4b3c1d$9e792@news.alaska-software.com...

Dear Mr. Bryan,

can you please elaborate a bit what you are awaiting from the RBAC system
and how you would use it.

In fact we have implemented for inhouse usage an RBAC which simple means
there is an account mgmt class with a data model allowing us to handle
useraccounts perform login and logout, associate roles to users, associate
permissions to roles and in turn validate if a user has a specific
permission.

Btw. this RBAC implementation is driving the authentication and permission
of our website and download center as well as the newsgroup and our internal
systems.

If thats what you want i can add a workitem to the team to release that
internal used RBAC implementation as an isolated package with source code to
be downloaded. Of course we can not give you any release date but you can
assume it will be this year.

regards
Steffen F. Pirsig
Alaska Software Inc.


"Stephen Bryan"  schrieb im Newsbeitrag
news:5e54c649$46d09756$167893@news.alaska-software.com...

In a post a about string encryption little over 3 years ago, Andreas Herdt
wrote

"One additional thing: One of the next previews will include an
implementation of
a "Role Based Access Control" (RBAC) system. Insofar you will get everything
ready to use out of the box."

Has this been implemented?
If so is it somewhere in the documentation?


Stephen