Vai al contenuto principale

Supported Models

  1. ACL (Access Control List)
  2. ACL con superuser
  3. ACL without users: Particularly useful for systems lacking authentication mechanisms or user login functionality.
  4. ACL without resources: Appropriate when permissions target resource types rather than individual resources. Examples include permissions like "write-article" and "read-log" that don't govern access to specific articles or logs.
  5. RBAC (Role-Based Access Control)
  6. RBAC with resource roles: Allows both users and resources to possess roles (or group memberships) simultaneously.
  7. RBAC with domains/tenants: Enables users to hold different role sets across different domains or tenants.
  8. ABAC (Attribute-Based Access Control): Utilizes convenient syntax like "resource.Owner" to access resource attributes.
  9. PBAC (Policy-Based Access Control): A versatile access control approach where authorization decisions derive from rule-based policies, enabling dynamic, context-aware access control.
  10. BLP (Bell-LaPadula): A formal state transition security model defining access control rules through security labels on objects and subject clearances.
  11. Biba (Biba Integrity Model): A security model controlling information flow to maintain data integrity and prevent unauthorized modifications.
  12. LBAC (Lattice-Based Access Control): A formal model merging confidentiality and integrity controls within a unified framework, using lattice structures for detailed access control decisions.
  13. OrBAC (Organisation-Based Access Control): Extends RBAC through abstraction layers separating concrete entities from abstract security policies, facilitating flexible multi-organizational access control.
  14. UCON (Usage Control): A modern access control model emphasizing ongoing authorization, mutable attributes, and a comprehensive framework encompassing authorizations, obligations, and conditions.
  15. RESTful: Handles path patterns such as "/res/*" and "/res/:id", along with HTTP methods including "GET", "POST", "PUT", and "DELETE".
  16. IP Match: Enables IP address-based matching for network-level access control.
  17. Deny-override: Accommodates both allow and deny authorizations, with deny taking precedence over allow.
  18. Priority: Permits prioritization of policy rules similar to firewall rule ordering.

Esempi

ModelloFile del modelloFile delle policy
ACLbasic_model.confbasic_policy.csv
ACL con superuserbasic_with_root_model.confbasic_policy.csv
ACL senza utentibasic_without_users_model.confbasic_without_users_policy.csv
ACL senza risorsebasic_without_resources_model.confbasic_without_resources_policy.csv
RBACrbac_model.confrbac_policy.csv
RBAC con ruoli su risorserbac_with_resource_roles_model.confrbac_with_resource_roles_policy.csv
RBAC con domini/tenantrbac_with_domains_model.confrbac_with_domains_policy.csv
ReBACrebac_model.confrebac_policy.csv
ABACabac_model.confN/A
BLPblp_model.confN/A
Bibabiba_model.confN/A
LBAClbac_model.confN/A
OrBACorbac_model.conforbac_policy.csv
IP Matchipmatch_model.confipmatch_policy.csv
RESTfulkeymatch_model.confkeymatch_policy.csv
Deny-overriderbac_with_not_deny_model.confrbac_with_deny_policy.csv
Allow-and-denyrbac_with_deny_model.confrbac_with_deny_policy.csv
Prioritàpriority_model.confpriority_policy.csv
Priorità Esplicitapriority_model_explicitpriority_policy_explicit.csv
Priorità per Soggettosubject_priority_model.confsubject_priority_policyl.csv