Role Based Access Control

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

this just unconfused me about selinux. The book I have is horrible on explanations at times.

MrEkg
Автор

I enjoyed day dreaming through this thanks

Denelix
Автор

Dude, where did you get the invisible pen?

djsargex
Автор

what software you using to edit this video like this?

farahwaheeda
Автор

I have picture question how can I send it to u ?

k.o
Автор

RBAC might be a bit bad for least privilege in the sense that the effective permissions are aligned to roles. You don't give each user a user an exact set of permissions they need but rather a, usually, over-approximation stemming from the roles available.

But with 'activating or switching a role', do you mean that the user uses only a subset of the roles they have to authenticate for a request? Because here is again the question how the roles are stored and how the access control mechanism gets to see them in order to map them to the permissions as an authorization decision takes place.

AWaterKnight
Автор

the pen movement is very distracting and annoying

zakmah
Автор

*THE WORST LECTURE ON YOUTUBE ON RBAC REASON WHY PPL ARE NOT GOING TO UDEMY*

joyjit_roy