ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

847 results

Related queries

rbac vs abac

attribute based access control

role-based access control in node js

role-based access control spring boot

rbac in azure

rbac kubernetes

mandatory access control

IBM Technology
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

Get the threat intelligence guide → https://ibm.biz/BdmwNZ Learn about the technology → https://ibm.biz/BdmwNY Exploring the ...

7:39
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

135,330 views

1 year ago

Web Dev Simplified
How To Handle Permissions Like A Senior Dev

Try Clerk: https://go.clerk.com/b2b-orgs Permission systems are in every single app, but most developers don't spend any time ...

36:39
How To Handle Permissions Like A Senior Dev

608,206 views

1 year ago

Permit
Easily create ABAC policies with the Permit UI - Tutorial

Join our Slack: https://bit.ly/permit-slack Read more about ABAC in our Docs: ...

11:15
Easily create ABAC policies with the Permit UI - Tutorial

9,606 views

3 years ago

Engineers.SG
A Secure Vault - implementing authorization middleware with Casbin - JuniorDevSG

Speaker: Christabel Neo Christabel Neo works as Associate Software Engineer for Open Government Products, GovTech ...

22:10
A Secure Vault - implementing authorization middleware with Casbin - JuniorDevSG

23,491 views

5 years ago

ByteGrad
Handle Permissions Like A Pro - Every Developer Should Know This

Critical things to understand about permissions (authorization) Permit (including a forever free tier): ...

21:28
Handle Permissions Like A Pro - Every Developer Should Know This

61,762 views

9 months ago

Hayk Simonyan
Authorization Explained: When to Use RBAC, ABAC, ACL & More

Become a Remote Senior Software Engineer with a Job Guarantee: ...

11:03
Authorization Explained: When to Use RBAC, ABAC, ACL & More

31,655 views

4 months ago

vlogize
Linking a Collection of Users to Policy Rules in Casbin RBAC Made Easy

Discover how to effectively link a collection of users to policy rules of a single resource using Casbin's `RBAC`, streamlining your ...

2:15
Linking a Collection of Users to Policy Rules in Casbin RBAC Made Easy

114 views

4 months ago

Lucas Barake
Best Way to Handle Permissions in TypeScript: RBAC & ABAC with Effect

Buy me a coffee! https://buymeacoffee.com/lucasbarake Blog: https://lucas-barake.github.io/building-a-composable-policy-system/ ...

12:21
Best Way to Handle Permissions in TypeScript: RBAC & ABAC with Effect

10,132 views

9 months ago

Permit
RBAC vs. ABAC vs. ReBAC in under 5 minutes

Learn more about Permit ➡️ https://www.permit.io Join Permit Authorization Slack Community ➡️ io.permit.io/slack Get the best ...

4:24
RBAC vs. ABAC vs. ReBAC in under 5 minutes

8,532 views

1 year ago

People also watched

Palo Alto Networks LIVEcommunity
What’s new in Next Generation CASB

Learn what's new in the Next Generation CASB.

39:48
What’s new in Next Generation CASB

2,998 views

2 years ago

Rik Hoffbauer
react-abac tutorial

This is a short video explaining how to get started with the react-abac library.

11:29
react-abac tutorial

4,703 views

6 years ago

czetsuyatech
Role Based Access Control in Spring Boot with Keycloak

In this video, we will use Keycloak to restrict the users' access by role. A project will be uploaded in GitHub that will return a list of ...

19:12
Role Based Access Control in Spring Boot with Keycloak

9,277 views

5 years ago

Bitglass
CASB 101: Why Does Anyone Need a CASB?

Learn about the problems that CASBs can solve in this video.

6:29
CASB 101: Why Does Anyone Need a CASB?

33,567 views

6 years ago

Yii2CMS
Permissions and RBAC Access Controls

Permissions and RBAC Access Controls.

17:01
Permissions and RBAC Access Controls

10,703 views

8 years ago

Farhad
Authorization simplified | Keycloak edition

Authorization mostly is considered a very challenging concept for developers who are new to it or even to a lot of experienced ...

1:06:01
Authorization simplified | Keycloak edition

9,656 views

10 months ago

Concepts Work
Role Based Access Control

What is RBAC ?, Role based Access control, RBAC for AzureAD, RBAC for Office365, Azure RM RBAC, Azure Portal RBAC, ...

45:15
Role Based Access Control

26,353 views

7 years ago

All Things IAM
Understanding Attribute Based Access Control (ABAC)

There are a few widely known authorization methods used today. The popular one is Role-based access control (RBAC).

20:28
Understanding Attribute Based Access Control (ABAC)

20,311 views

3 years ago

Kees Leune
Role-Based Access Control

This is the last Access Control video for CSC280. In it, I discuss role-based access control, and I explain why RBAC is more ...

13:11
Role-Based Access Control

3,724 views

5 years ago

Jan Marshal
Authorization in Next.js is Easy! (RBAC)

Authorization is one of the most important concepts to understand in web development. Far too many people skip implementing ...

36:15
Authorization in Next.js is Easy! (RBAC)

8,829 views

1 year ago

Anthony GG
An Effective Way To Authorize Handlers In Golang

Join my Discord community for free education https://discord.com/invite/bDy8t4b3Rz ▻ Pre order (get 30% off) my exclusive ...

15:18
An Effective Way To Authorize Handlers In Golang

19,433 views

2 years ago

COSCUP 開源人年會
初試 Casbin - 快速搭建符合 99% 產品都需要的高彈性可維護之授權控制系統 | COSCUP x RubyConfTW 2021

相信開發人員都設計過權限功能,在不同程式語言也都有不同的框架與設定權限方法在服務切割越來越微細的世代,是不是有一種 ...

34:29
初試 Casbin - 快速搭建符合 99% 產品都需要的高彈性可維護之授權控制系統 | COSCUP x RubyConfTW 2021

1,506 views

4 years ago

vlogize
Unlocking Role Matching by Pattern in Casbin

Discover how to achieve role matching by pattern in Casbin effectively, along with workarounds for complex policies. --- This video ...

2:02
Unlocking Role Matching by Pattern in Casbin

235 views

6 months ago

Mastery Learning
Ken Thompson: Why did we create Golang?

Ken Thompson answers a question about the reason behind the creation of Golang at Google I/O 2012.

0:31
Ken Thompson: Why did we create Golang?

196,385 views

1 year ago

Hayk Simonyan
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO

Become a Remote Senior Software Engineer with a Job Guarantee: ...

6:04
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO

285,981 views

5 months ago

Erik Wilde
Role-Based Access Control (RBAC) Explained: How it works and when to use it

Role-Based Access Control (RBAC) is a popular model for access control in large organizations. The reason for this is that it ...

8:00
Role-Based Access Control (RBAC) Explained: How it works and when to use it

78,345 views

4 years ago

Milan Jovanović
How to Protect Endpoints with Role-Based Access Control in .NET

Support me on Patreon to access the source code: https://www.patreon.com/milanjovanovic ☄️ Master the Modular Monolith ...

14:18
How to Protect Endpoints with Role-Based Access Control in .NET

17,219 views

1 month ago

Fireship
Session vs Token Authentication in 100 Seconds

Learn the difference between session and token-based authentication on the web. Master Web Security in 12 weeks ...

2:18
Session vs Token Authentication in 100 Seconds

1,364,730 views

5 years ago

ManageEngine IAM and SIEM
Understanding CASB in one minute

Explore how organizations can stay protected against data exfiltration and shadow applications by using a cloud access security ...

1:22
Understanding CASB in one minute

9,804 views

3 years ago