리소스 역할이 있는 RBAC: 사용자와 리소스 모두 동시에 역할(또는 그룹)을 가질 수 있습니다.
도메인/테넌트가 있는 RBAC: 사용자는 다른 도메인/테넌트에 대해 다른 역할 세트를 가질 수 있습니다.
ABAC (속성 기반 접근 제어): "resource.Owner"와 같은 문법 설탕을 사용하여 리소스의 속성을 얻을 수 있습니다.
PBAC (Policy-Based Access Control): A flexible access control model that makes authorization decisions based on policies defined as rules, supporting dynamic and contextual authorization.
BLP (Bell-LaPadula): A formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects.
Biba (Biba Integrity Model): A computer security model that restricts information flow in a system to prevent unauthorized disclosure of classified information.
LBAC (Lattice-Based Access Control): A formal access control model that combines confidentiality and integrity controls in a unified framework, implementing a lattice structure for granular access control decisions.
OrBAC (Organisation-Based Access Control): Extends RBAC with abstraction layers that separate concrete entities from abstract security policies, enabling flexible multi-organizational access control.
UCON (Usage Control): A next-generation access control model that emphasizes continuous authorization, attribute mutability, and a unified framework of authorizations, obligations, and conditions.
RESTful: "/res/*", "/res/:id"와 같은 경로와 "GET", "POST", "PUT", "DELETE"와 같은 HTTP 메소드를 지원합니다.
IP Match: Supports IP address matching for network-based access control.