Daniel Bass
How to Implement Attribute Based Access Control (ABAC) using Open Policy Agent (OPA)
The Bikini Bottom guide to ABAC authorization models and their implementation with OPA
Daniel Bass
The Bikini Bottom guide to ABAC authorization models and their implementation with OPA
Daniel Bass
The Bikini Bottom guide to RBAC authorization models and their implementation with OPA
Or Weis
Announcing Low-code Attribute Based Access Control (ABAC)
Or Weis
IAM is huge in DevSecOps, with seemingly infinite buzzwords and terms. Here are the main ones every engineer and security professional should know.
Or Weis
Delegate access control with simple, embeddable interfaces
Daniel Bass
What is Attribute Based Access Control, when should it be used, how can you implement it in your application, and how can you provide a UI for managing it?
Daniel Bass
RBAC provides a simple, intuitive authorization solution, while ABAC allows for more fine-grained, dynamic authorization. Learn how to combine the strengths of both
Gabriel L. Manor
Learn how to implement middleware for a granular access control system in Fastify applications using the Permit.io cloud service.
Daniel Bass
Access Control is a main concern when developing web applications - and the NSA has a lot to say about it, especially the biggest pitfall developers make.
Daniel Bass
Migrating from Role-based access control (RBAC) to Attribute-based access control (ABAC) can prove quite challenging - here's how you can do it painlessly.
Gabriel L. Manor
Learn how to build a Cedar-based application authorization system. A practical tutorial to build a comprehensive auto-scaled solution with OPAL and Cedar agent.
Gabriel L. Manor
Learn how to create authorization middleware for an ExpressJS application. Use RBAC and ABAC permissions models seamlessly in your Express app.
Gabriel L. Manor
Learn how to implement Authorization in FastAPI applications with Permit.io, a permission management system. Follow a step-by-step guide using RBAC and ABAC.
Daniel Bass
ABAC vs. ReBAC - A comprehensive guide to the pros, cons, use cases, and implementation of these common authorization models
Daniel Bass
Get ready to rumble! Join us on a quest to find the best authorization policy model in an epic battle royale: RBAC vs. ABAC vs. ReBAC
Gabriel L. Manor
Learn how to use passkeys and fine-grained authorization for better access control in cloud applications, including an example project and a detailed tutorial.
Gabriel L. Manor
Learn best practices for implementing ABAC (Attribute-Based Access Control) in application authorization, including real-world use cases and code examples.
Daniel Bass
If you've worked on authorization before, you know that sometimes standard policy models just aren't enough. What can we do then? Let's find out -
Daniel Bass
Learn how to quickly create and implement custom user experiences for your application with User Attributes and Feature Flags
Gabriel L. Manor
Learn how to implement Fine-Grained Django Authorization, including user permissions with models such as RBAC, ReBAC, and ABAC.
Daniel Bass
Attribute-Based Access Control (ABAC) and Relationship-Based Access Control (ReBAC) - how to make the most suitable choice for your application?
Daniel Bass
Learn how to protect user data from AI crawlers with Fine-Grained Authorization (FGA) by Identifying bots, classifying data, and empowering users with control.
Daniel Bass
See how Maricopa County used Fine-Grained Authorization (FGA) to secure its voting system. A case study for developers protecting data in large-scale operations
Daniel Bass
Externalizing FGA allows developers to focus on core application features, ensuring secure access control - A case study of Rivulis’ experience with FGA
Gabriel L. Manor
Attribute Based Access Control (ABAC) is an authorization model that grants access based on environmental conditions, as well as user and resource attributes. Learn how ABAC works, its use cases, and how to implement it in your application