Hasura Authorization System through Examples
This article discusses the implementation of authorization systems using Hasura's JSON-based DSL. It provides a brief overview of Hasura's authorization system and explains how to create new roles, set permissions for select, insert, update, and delete operations on tables in the schema. The text then delves into real-world examples such as simple role-based access control, per-resource roles, hierarchical roles, and attribute-based access control. It also touches upon using views to handle more complex scenarios and mentions resources for learning more about authorization rules.
Company
Hasura
Date published
March 17, 2020
Author(s)
Gautam BT
Word count
1604
Language
English
Hacker News points
None found.