|
Nando, do you happen to have any examples of this that you could post up
or email to me? I’ve read Hal’s article but I’d be interested
to see a working version of it. -----Original Message----- I really like Hal's conceptual model of
permissions. He has an article on his site, i believe, that presents it in
terms of a set of keys. Whatever their role, users are either given a key or
not to use a function in the application. What that becomes then is a
PermissionKey set of boolean values, or a KeyRing. So rather than the abstract
concept Security ... KeyRing is a more solid concept to start building an
OO model from. I use this conceptual model and i really
like it. Keys can be added or removed very easily from the system. And it's
very flexible. A user can be assigned a permission that would out of the
ordinary for their role - and as Hal points out in his article, that tends to
happen in real life scenarios fairly often.
|
- RE: [CFCDev] OO Security Brian Kotek
- RE: [CFCDev] OO Security Nando
- RE: [CFCDev] OO Security Tangorre, Michael
- RE: [CFCDev] OO Security Jeff Chastain
- Re: [CFCDev] OO Security Qasim Rasheed
- RE: [CFCDev] OO Security Jeff Chastain
- RE: [CFCDev] OO Security Nando
- RE: [CFCDev] OO Security Jim Davis
- RE: [CFCDev] OO Security jamie lawrence
- RE: [CFCDev] OO Security Jim Davis
