/plushcap/analysis/hasura/hasura-authorization-system-through-examples

Hasura Authorization System through Examples

What's this blog post about?

This article discusses the implementation of authorization systems using Hasura's JSON-based DSL. It provides a brief overview of Hasura's authorization system and explains how to create new roles, set permissions for select, insert, update, and delete operations on tables in the schema. The text then delves into real-world examples such as simple role-based access control, per-resource roles, hierarchical roles, and attribute-based access control. It also touches upon using views to handle more complex scenarios and mentions resources for learning more about authorization rules.

Company
Hasura

Date published
March 17, 2020

Author(s)
Gautam BT

Word count
1604

Hacker News points
None found.

Language
English


By Matt Makai. 2021-2024.