This chapter looks at relationship-based authorization models and shows how to implement data ownership, parent-child resources, groups, and hierarchies.
Skimmed through this, need to come back later
rebac
authorization
FoldFold allExpandExpand allAre you sure you want to delete this link?Are you sure you want to delete this tag?
The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community