Read 14 ~ Access Control (ACL)
By Abdallah obaid
NAME | URL |
---|---|
Home | Home. |
Prep | Prep: Engineering Topics. |
Read 01 | Node Ecosystem, TDD, CI/CD. |
Read 02 | Classes, Inheritance, Functional. |
Read 03 | Data Modeling & NoSQL Databases. |
Read 04 | Advanced Mongo/Mongoose. |
Read 05 | Linked Lists. |
Read 06 | HTTP and REST. |
Read 07 | Express. |
Read 08 | Express Routing & Connected API. |
Read 09 | API Server. |
Read 10 | Stacks and Queues. |
Read 11 | Authentication. |
Read 12 | OAuth. |
Read 13 | Bearer Authorization. |
Read 14 | Access Control (ACL). |
Read 15 | Trees. |
Read 16 | Event Driven Applications. |
Access Controls
## Access Controls:
- Limiting what actions a user can preform on a given resource is called Access Control.
- Access control is a security technique that regulates who or what can view or use resources in a computing environment.
- Access Controls are the selective restriction of resources.
## Content management system CMS:
- A content management system is a software application that can be used to manage the creation and modification of digital content.
- CMS might be:
- admin users to create categories, content, manage user accounts, and run reports.
- editor users to create, edit and delete existing content, but not see or manage user accounts.
- guest users to access (read) content.
- user users (logged in users) to access (read) content and apply a thumbs-up/down to content, but not change the actual content. ## Role-based access control (RBAC):
- Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
- RBAC lets employees have access rights only to the information they need to do their jobs.
- RBAC Allows us to use polices so if employees change then we just need to change his yours.