DB Schema of a Role Based Access Control

别等时光非礼了梦想. 提交于 2019-11-29 23:09:48
AnaZgombic

I'm going to give another example of an RBAC system I really like. please check out the radicore framework by Tony Marston here.

I'm not sure if it meets all of your requirements but something you can compare your work with can help.

I don't seem to be seeing much of the RBAC mappings, such as:

Operation  = Any action, such as CRUD operations
Object     = Reference to any object instance

Permission = Mapping of 'Operation' + 'Object'

I'm not sure what all your "credential" tables are? A credential normally holds properties to prove one's identity (ie: username/password). Why do you have credentials for roles?

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!