In this part I'll tell you about the development approach we chose.
To avoid the situation when a framework is being built according to some pure theoretical ideas and as a result it is hard to use it in real world scenarios we had decided to start from the other side: try implementing an application that seems to be more or less real, put into practice our security concepts and thus develop the security system.
We chose Northwind database model as a playground and slightly modified it to add some complexity in company staff relationships.
Here is the updated organization chart for our Northwind company.
There are 2 sales departments: first is located in Seattle and second is in London. Both of them are managed by a sales manager, each of them has 2 sales representatives and 1 stock manager. Sales representatives report to sales manager, both sales managers report to sales president.
In this application model we defined the following main types of entities to secure:
- Customer
- Order
- Product
- Employee
Next we have to define which company staff will have access to these secured entities, and which won't. Moreover, there might be several levels of access, for example, read, write and any other more specific ones.
According to the organization chart, we define 4 main roles:
- Stock manager
- Sales representative
- Sales manager
- Sales president
- All staff has read-only access to employees data.
- Stock managers manage products. They doesn't have access to customers and orders.
- Sales representatives have read-only access to products, have full access to customers of their sales department and their own orders. They don't have access to order approval.
- Sales managers also have full access to customers of the sales department, to their own orders and well as to orders of sales representatives in their sales department. Moreover, sales managers have access to the order approval operation.
- Sales president has access to all kind of information without limitation, but in read-only mode. In addition, he can manage employees (hire, dismiss, so he also has write access).
This matrix that demonstrates the additional limitations that must be met as well.
So, here is the deal: we need to provide a flexible and efficient security framework that can be used in domain models like this one with all above-mentioned permissions and limitations. In the next post I'll show you whether we managed to achieve the goal and how we did it.
Cant wait for another post, when will you post it?
ReplyDeleteGreat Article
DeleteNetwork Security Final Year Projects for CSE
Project Centers in Chennai
Great Article
DeleteNetwork Security Final Year Projects for CSE
Project Centers in Chennai
Patience, Peter. Will post the next one this week, I hope.
ReplyDeleteBeautiful! Can't wait too. This will be useful.
ReplyDeleteThis comment has been removed by the author.
ReplyDeletehmm, part3 where are you?
ReplyDeleteThanks for your interest, guys. It is coming soon.
ReplyDeleteNot sure it will be published today, more likely the beginning of the next week.
Your article has proven useful to me. It’s very informative and you are obviously very knowledgeable in this area. You have opened my eyes to varying views on this topic with interesting and solid content. identity access management products
ReplyDeleteThe security administrations utilize the most recent innovation and very gifted staff and security experts who can be trusted for great administrations.Best Security Place reviews
ReplyDeletesdasd
ReplyDeleteThey provide high quality, revolutionary as well as sophisticated safety as well as existence security devices such as fireplace as well as smoke cigarettes devices, movie monitoring, motion sensors, glass-break sensors and residential automation technologies like electronic door hair. You can also take advantage of professional guidance in choosing the very best solution for your house by talking to the actual company’s safety specialists http://www.best-5-home-security-companies.com/protect-america.
ReplyDeleteThis article will discuss through an introduction of security development, how we can feel a little safer about the security we implement in our systems 먹튀검증
ReplyDeleteThanks for sharing this post. Kanhasoft is top notch software company offering offshore .net development services in India. We are expert in creating robust and reliable Dot net web application at affordable price. Visit our site to know more about us.
ReplyDeleteNetwork Security is the next wave which is bound to sweep the software market. Securing the network is an art by itself www.findmeasecuritycompanyin.com
ReplyDeleteIn that circumstance, the team-building model can be coordinated at setting up generally speaking work assemble objectives, which influence both individual and collective endeavor and conduct, and, at last, the execution results at both the person, and additionally the gathering level. team building
ReplyDeleteA portable fish finder is a good choice if you don't fish from the same ship all the time. https://internetprivatsphare.ch
ReplyDeleteAppreciating the persistence you put into your blog and detailed information you provide. I’ve bookmarked your site and I’m adding your RSS feeds to my Google account. les meilleurs vpn
ReplyDeleteI have used a lot of juicers in the past and I created this blog to help juice lovers make the right decision in choosing the type of juicer that best fit their needs. There are several good masticating juicers to choose from. vpn reviews
ReplyDeleteI am glad to locate your recognized method for composing the post. Presently you make it simple for me to comprehend and actualize the idea. Much obliged to you for the post. https://privacyonline.fi
ReplyDeleteI was taking a gander at some of your posts on this site and I consider this site is truly informative! Keep setting up..
ReplyDeletealarms Dublin
Incredible articles and awesome design. Your blog entry merits the greater part of the positive input it"s been getting. thebestvpn
ReplyDeleteI have read your blog it is very helpful for me. I want to say thanks to you. I have bookmark your site for future updates. https://internetprivatsphare.at
ReplyDeleteMany homework on the continual hunt along with offstage on the road to winning. Definitely not attached, simple to-fall as a result of wayside; And not investigation, afterward into a path travel toward the black. debestevpn.nl
ReplyDeleteCriminals are getting more and more creative and ingenious with their modus operandi and becoming much more proficient in disabling security features. Locksmith
ReplyDeleteA fascinating dialog is value remark. I feel that it is best to compose more on this matter, it may not be an unthinkable theme however generally people are insufficient to chat on such subjects. To the following. Salud. vpnveteran.com
ReplyDeleteHave you thought about how people get rich? NOT? And you go to BGAOC and try to win and not be defeated. real casino only here The most perfect feeling is to play and get paid for it.
ReplyDeleteSpy cams used to be big, bulky and impractical to use. Nowadays, they are all about compactness and portability - the smaller they are and easier to conceal, the better. Erica
ReplyDeleteI definitely loved every little bit of it. I have you bookmarked your site to check out the new stuff you post. vpnveteran.com
ReplyDeleteNice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. Finde mehr heraus
ReplyDeleteI really enjoy simply reading all of your weblogs. Simply wanted to inform you that you have people like me who appreciate your work. Definitely a great post. Hats off to you! The information that you have provided is very helpful. internet privatsphare
ReplyDeleteA good blog always comes-up with new and exciting information and while reading I have feel that this blog is really have all those quality that qualify a blog to be a one. lemigliorivpn
ReplyDeleteIts an incredible joy perusing your post.Its brimming with data I am searching for and I want to post a remark that "The substance of your post is marvelous" Great work. deze website
ReplyDeleteI am really enjoying reading your well written articles. It looks like you spend a lot of effort and time on your blog. I have bookmarked it and I am looking forward to reading new articles. Keep up the good work. security company leek
ReplyDeleteGreat post, and great website. Thanks for the information! Alarms in Parramatta
ReplyDeleteHey ,
ReplyDeleteLearn a lot from your write up. Very nice understanding with user. I have a little demand from you. Could you please share a post about best kayak fish finder. I have looking for last 2 days but didn't find proper review about it. If you share about it I'm appreciate with you.
Cheers
Bikash Roy
Excellent blog and I really glad to visit your post. Keep continuing...
ReplyDeleteEmbedded System Course Chennai
Embedded Systems Course
Unix Training in Chennai
Power BI Training in Chennai
Pega Training in Chennai
Spark Training in Chennai
Linux Training in Chennai
Tableau Training in Chennai
Oracle Training in Chennai
Appium Training in Chennai
Graphic Design Courses in Chennai
Embedded Training in OMR
Innovative blog thanks for sharing this information.
ReplyDeleteSelenium Training in chennai | Selenium Training in annanagar | Selenium Training in omr | Selenium Training in porur | Selenium Training in tambaram | Selenium Training in velachery
http://gbasibe.com
ReplyDeletehttp://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
ReplyDeletehttp://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com
http://gbasibe.com