Company
Date Published
March 17, 2020
Author
Gautam BT
Word count
1604
Language
English
Hacker News points
None

Summary

This article discusses the implementation of authorization systems using Hasura's JSON-based DSL. It provides a brief overview of Hasura's authorization system and explains how to create new roles, set permissions for select, insert, update, and delete operations on tables in the schema. The text then delves into real-world examples such as simple role-based access control, per-resource roles, hierarchical roles, and attribute-based access control. It also touches upon using views to handle more complex scenarios and mentions resources for learning more about authorization rules.