Daniel Bass & Gabriel L. Manor
MAC, DAC, RBAC, and FGA: A Journey Through Access Control
A guide to the most common access control terms. Learn how to integrate MAC and DAC and RBAC, and how the rise of FGA can help your application access control.
Daniel Bass & Gabriel L. Manor
A guide to the most common access control terms. Learn how to integrate MAC and DAC and RBAC, and how the rise of FGA can help your application access control.
Daniel Bass
Learn how to protect user data from AI crawlers with Fine-Grained Authorization (FGA) by Identifying bots, classifying data, and empowering users with control.
Daniel Bass
See how Maricopa County used Fine-Grained Authorization (FGA) to secure its voting system. A case study for developers protecting data in large-scale operations
Daniel Bass
Externalizing FGA allows developers to focus on core application features, ensuring secure access control - A case study of Rivulis’ experience with FGA
Daniel Bass
Externalizing FGA allows developers to focus on core application features while ensuring secure authorization - A case study of Honeycombs’ experience with FGA
Gabriel L. Manor & Daniel Bass
Learn how Fine Grained Authorization (FGA) can enhance your application's security and provide precise, dynamic permissions.
Daniel Bass
RBAC provides a simple, intuitive authorization solution, while ABAC allows for more fine-grained, dynamic authorization. Learn how to combine the strengths of both
Daniel Bass
Learn how to build cloud-native authorization systems with CI/CD, thorough testing, and precise modeling and implementation.
Daniel Bass
Learn how to use JWT for authorization, understand the basics of what JWT is, and explore examples of proper JWT usage in authentication and authorization.
Gabriel L. Manor
Discover how AI and authorization intersect. Learn to manage GenAI bots securely with fine-grained authorization using tools like Permit.io and Arcjet.
Arindam Majumder
Learn how to implement scalable authorization in GraphQL. Simplify RBAC and Permissions management with step-by-step instructions.
Bartosz Pietrucha
Learn how to implement enterprise-grade security for AI / LLM applications with Fine Grained Authorization (FGA) and Retrieval Augmented Generation (RAG)