EUNO.NEWS EUNO.NEWS
  • All (21181) +146
  • AI (3169) +10
  • DevOps (940) +5
  • Software (11185) +102
  • IT (5838) +28
  • Education (48)
  • Notice
  • All (21181) +146
    • AI (3169) +10
    • DevOps (940) +5
    • Software (11185) +102
    • IT (5838) +28
    • Education (48)
  • Notice
  • All (21181) +146
  • AI (3169) +10
  • DevOps (940) +5
  • Software (11185) +102
  • IT (5838) +28
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 2 days ago · software

    🎨Testing RBAC permissions just got visual

    !Cover image for 🎨Testing RBAC permissions just got visualhttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format=auto/https%3A...

    #RBAC #access-control #Streamlit #Python #UI #security #devtools
  • 2 days ago · devops

    Kubernetes namespaces: concepts & key commands

    Introduction What are Namespaces in Kubernetes? - A namespace is a logical grouping of resources within a cluster. - Useful for separating environments such as...

    #kubernetes #namespaces #kubectl #cluster-management #dev-environment #staging #production #resource-quota #access-control
  • 3 days ago · software

    Enterprise-Grade Access Control for Python Apps - Battle-Tested & Open Source

    Quick Summary Ever needed proper access control in your app but didn't want to: - Roll your own buggy permission system? - Pull in a heavyweight framework with...

    #RBAC #Python #access control #authorization #library #zero dependencies #role hierarchy #ABAC #multi-tenant
  • 4 days ago · software

    Why hiding IDs wasn’t enough for secure share links

    !Cover image for Why hiding IDs wasn’t enough for secure share linkshttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format=auto...

    #security #share-links #hashing #URL-design #access-control #revocation #expiry #backend #web-development
  • 5 days ago · software

    Banning Things for Other People Is Easy

    Article URL: https://dogdogfish.com/blog/2026/01/14/banning-things-for-other-people/ Comments URL: https://news.ycombinator.com/item?id=46631192 Points: 40 Comm...

    #moderation #user bans #access control #admin tools #software design
  • 6 days ago · software

    Lab: Accidental exposure of private GraphQL fields

    Lab Overview The user‑management functions for this lab are powered by a GraphQL endpoint. An access‑control vulnerability allows the API to reveal private cre...

    #GraphQL #security #pentesting #access-control #introspection #web-vulnerability #lab
  • 1 week ago · software

    Show HN: We built a permissions layer for Notion

    My agency was bleeding $1,800/year on contractor Notion seats. The problem: I needed to give contractors access to specific data CRM, project tracker but couldn...

    #Notion #permissions #access control #row-level security #SaaS #contractor management
  • 3 weeks ago · software

    Permission Systems for Enterprise That Scale

    Article URL: https://eliocapella.com/blog/permission-systems-for-enterprise/ Comments URL: https://news.ycombinator.com/item?id=46374117 Points: 3 Comments: 0...

    #permission systems #access control #enterprise architecture #scalability #security #RBAC #IAM
  • 0 month ago · software

    Real-World System Design: Authentication, RBAC, and Multi-Tenant Architecture (Part 1)

    Why This Series? Most tutorials show: - “Add JWT authentication” - “Protect a route” - “Create roles like admin and user” But real systems need answers to hard...

    #authentication #RBAC #multi-tenant #system design #authorization #access control #scalability #design patterns
  • 0 month ago · devops

    For added data security, you can use IAM authentication for RDS for any aws services or for any IAM users! This is a bit overhead to configure at first, but I find it very secure instead of sharing the master password.

    markdown !Forem Logohttps://media2.dev.to/dynamic/image/width=65,height=,fit=scale-down,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2...

    #IAM #RDS #AWS #authentication #database security #cloud #devops #access control
  • 1 month ago · software

    How to Implement Zero Trust Authentication in Your Node.js Applications?

    Introduction It started with a client meeting that left me uneasy. One of their Node.js microservices had suffered a security incident—not catastrophic, but en...

    #zero trust #authentication #node.js #microservices #security #jwt #access control #devops practices
  • 1 month ago · software

    Safeguarding Your React Native App: Protecting Screens for Unauthorized Users

    !Cover image for Safeguarding Your React Native App: Protecting Screens for Unauthorized Usershttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cove...

    #react-native #mobile-app #authentication #access-control #security #screen-protection #unauthorized-users

Newer posts

Older posts
EUNO.NEWS
RSS GitHub © 2026