Passer au contenu principal

Modèles pris en charge

  1. ACL (liste de contrôle d'accès)
  2. ACL avec superutilisateur
  3. ACL without users: This is especially useful for systems that don't have authentication or user logins.
  4. ACL without resources: In some scenarios, the target is a type of resource instead of an individual resource. Permissions like "write-article" and "read-log" can be used. This doesn't control access to a specific article or log.
  5. RBAC (contrôle d'accès par rôle)
  6. RBAC with resource roles: Both users and resources can have roles (or groups) at the same time.
  7. RBAC with domains/tenants: Users can have different sets of roles for different domains/tenants.
  8. ABAC (Attribute-Based Access Control): Syntax sugar like "resource.Owner" can be used to get the attribute for a resource.
  9. RESTful: Supports paths like "/res/*", "/res/:id", and HTTP methods like "GET", "POST", "PUT", "DELETE".
  10. Deny-override: Both allow and deny authorizations are supported, where deny overrides allow.
  11. Priority: The policy rules can be prioritized, similar to firewall rules.


ModélisationFichier modèleFichier de régulation
ACLConf de baseCsv
ACL avec super-utilisateurBasique avec le modèle racine.confCsv
ACL sans utilisateursBasic_without_users_model.confformat@@0 Basic_without_users_policy
ACL sans ressourcesModèle de base sans ressourceformat@@0 Basic_without_resources_policy
RBACformat@@0 rbac_model.confformat@@0 rbac_policy.csv
RBAC avec les rôles de ressourceformat@@0 rbac_with_resource_model.confformat@@0 rbac_with_resource_roles_policy
RBAC avec domaines/locatairesformat@@0 rbac_with_domains_model.confformat@@0 rbac_with_domains_policy.csv
ABACformat@@0 abac_model.confN/A
RESTANTformat@@0 keymatch_model.confCsv
Refuser la substitutionformat@@0 rbac_with_not_deny_model.confformat@@0 rbac_with_deny_policy.csv
Allumer et refuserformat@@0 rbac_with_deny_model.confformat@@0 rbac_with_deny_policy.csv
Priorité explicitemodèle de priorité explicitecsv