Essentials of Role-Based Access Control

The SecurID Governance & Lifecycle Business Role Manager module ensures that the right people have access to the right resources. By defining roles, businesses can enhance their security, simplify onboarding, and ensure that the right users have ac… Continue reading Essentials of Role-Based Access Control

Is using EXECUTE AS impersonation for user authentication in a web application a good idea?

I wrote a web application that is using AD authentication (Windows) and has its own authorization module (RBAC-like). Back-end is Microsoft SQL Server.
A DBA on my team is not happy with us using a service account to talk to the database, … Continue reading Is using EXECUTE AS impersonation for user authentication in a web application a good idea?

How to implement MySQL query fo RBAC authorization with fine grained business restrictions in role?

When implementing an authorization system like RBAC/DAC, or XACML, or the AWS IAM authorization model, I see that I can’t totally decouple business logic from authorization when there are fine-grained business restrictions.
We don’t use OR… Continue reading How to implement MySQL query fo RBAC authorization with fine grained business restrictions in role?