-
See community discussion and proposal
https://community.openhab.org/t/rbac-model-in-openhab-and-potential-security-vulnerability-found/136419
-
## Description
Implement role-based access control in our application to restrict feature access based on user roles. Using Google OAuth for authentication, we need to define roles like Admin and Use…
-
Currently the RBAC works by wrapping the EventHandlers inside another one that checks for roles. This does work, but is probably not the best solution. One reason being `useFetch` doesn't pass the cli…
-
We'll have at least `owner`, `charity`, `participant`, and `doner` roles.
-
Applications:
- [ ] Users can only view applications that they are authorized to view
- [ ] Users need authorization to be able to deploy their own Applications
- [ ] Users need authorization to be…
-
### Service Package Request
https://github.com/Azure-Samples/azure-sdk-for-go-samples.git
https://github.com/Azure-Samples/azure-sdk-for-go-samples/tree/main/sdk/resourcemanager/network/securi…
-
# Role-based access control (RBAC)
In role-based access control, a user would be restricted to a set of operations that can be performed by their role.
> Examples from Yan Cui: https://theburnin…
-
Follows #24
Part of #248
# Context
`role-based` seems to make less sense than `policy-based` or `attribute-based` access control because it is better for large, established, complex systems. Ou…
-
**Steps to reproduce:**
1. Grant Reader role to Storage Account.
2. Grant Storage Blob Data Contributor role to a container within the Storage Account.
3. In VS Code, do "Azure: Sign In".
4. In th…
-
Would be great if we could have more control over which roles can access various LSCache settings. Eg. who can edit the .htaccess file etc.