Architecture 2024-05-22

Exploring Permission Management Design

Understand ACL, RBAC, and ABAC permission design methods with functional/data scope, control targets, and operational constraints.

Read in: ja
Exploring Permission Management Design

Overview

I researched case studies on permission management design and took notes.

Research Notes

I organized the information I researched, but there are still things I don't fully understand, so it's not completely organized.

Elements Composing Permissions

Permissions seem to be composed of the following elements:

Permission Design Methods

The following methods are generally considered for design:

The flexibility of permissions and the complexity of implementation are ACL < RBAC < ABAC.

Perspectives on Permission Design

The following perspectives seem relevant for permission design:

Required System Characteristics

Considered the system characteristics required for a system that manages permissions.

Impressions

Although it's a general impression as it depends on the industry and business domain of the service, I think permission management is particularly demanded in B2B services.

It seems like there isn't a well-established body of information or best practices.

It seems like a field where you could write a whole book, but there don't seem to be many related books.

I feel like I've identified the perspectives to consider, but the particularly challenging part seems to be how much flexibility to allow in permissions. I thought it would be necessary to expand the design while considering future business requirements to some extent.

References

Tags: ABAC ACL RBAC Permission Management System Design Link Collection
Share: 𝕏 Post Facebook Hatena
✏️ View source / Discuss on GitHub
☕ Support

If you enjoy this blog, consider supporting it. Every bit helps keep it running!


Related Articles