Bỏ qua đến nội dung chính

Supported Models

  1. **ACL (Access Control List - Danh sách kiểm soát truy cập)
  2. ACL với superuser - người dùng cấp cao
  3. ACL without users: Particularly useful for systems lacking authentication mechanisms or user login functionality.
  4. ACL without resources: Appropriate when permissions target resource types rather than individual resources. Examples include permissions like "write-article" and "read-log" that don't govern access to specific articles or logs.
  5. RBAC (Role-Based Access Control - Kiểm soát truy cập dựa trên vai trò)
  6. RBAC with resource roles: Allows both users and resources to possess roles (or group memberships) simultaneously.
  7. RBAC with domains/tenants: Enables users to hold different role sets across different domains or tenants.
  8. ABAC (Attribute-Based Access Control): Utilizes convenient syntax like "resource.Owner" to access resource attributes.
  9. PBAC (Policy-Based Access Control): A versatile access control approach where authorization decisions derive from rule-based policies, enabling dynamic, context-aware access control.
  10. BLP (Bell-LaPadula): A formal state transition security model defining access control rules through security labels on objects and subject clearances.
  11. Biba (Biba Integrity Model): A security model controlling information flow to maintain data integrity and prevent unauthorized modifications.
  12. LBAC (Lattice-Based Access Control): A formal model merging confidentiality and integrity controls within a unified framework, using lattice structures for detailed access control decisions.
  13. OrBAC (Organisation-Based Access Control): Extends RBAC through abstraction layers separating concrete entities from abstract security policies, facilitating flexible multi-organizational access control.
  14. UCON (Usage Control): A modern access control model emphasizing ongoing authorization, mutable attributes, and a comprehensive framework encompassing authorizations, obligations, and conditions.
  15. RESTful: Handles path patterns such as "/res/*" and "/res/:id", along with HTTP methods including "GET", "POST", "PUT", and "DELETE".
  16. IP Match: Enables IP address-based matching for network-level access control.
  17. Deny-override: Accommodates both allow and deny authorizations, with deny taking precedence over allow.
  18. Priority: Permits prioritization of policy rules similar to firewall rule ordering.

Ví dụ

Mô hìnhTệp mô hìnhTệp chính sách
ACLbasic_model.confbasic_policy.csv
ACL với superuserbasic_with_root_model.confbasic_policy.csv
ACL không có người dùngbasic_without_users_model.confbasic_without_users_policy.csv
ACL không có tài nguyênbasic_without_resources_model.confbasic_without_resources_policy.csv
RBACrbac_model.confrbac_policy.csv
RBAC với vai trò tài nguyênrbac_with_resource_roles_model.confrbac_with_resource_roles_policy.csv
RBAC với miền/thuê baorbac_with_domains_model.confrbac_with_domains_policy.csv
ReBACrebac_model.confrebac_policy.csv
ABACabac_model.confN/A
BLPblp_model.confN/A
Bibabiba_model.confN/A
LBAClbac_model.confN/A
OrBACorbac_model.conforbac_policy.csv
IP Matchipmatch_model.confipmatch_policy.csv
RESTfulkeymatch_model.confkeymatch_policy.csv
Từ chối ghi đèrbac_with_not_deny_model.confrbac_with_deny_policy.csv
Cho phép và từ chốirbac_with_deny_model.confrbac_with_deny_policy.csv
Ưu tiênpriority_model.confpriority_policy.csv
Ưu tiên Rõ Ràngpriority_model_explicitpriority_policy_explicit.csv
Ưu Tiên Chủ Thểsubject_priority_model.confsubject_priority_policyl.csv