ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

639 results

IBM Technology
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

Get the threat intelligence guide → https://ibm.biz/BdmwNZ Learn about the technology → https://ibm.biz/BdmwNY Exploring the ...

7:39
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

135,841 views

1 year ago

Web Dev Simplified
How To Handle Permissions Like A Senior Dev

Try Clerk: https://go.clerk.com/b2b-orgs Permission systems are in every single app, but most developers don't spend any time ...

36:39
How To Handle Permissions Like A Senior Dev

609,300 views

1 year ago

Engineers.SG
A Secure Vault - implementing authorization middleware with Casbin - JuniorDevSG

Speaker: Christabel Neo Christabel Neo works as Associate Software Engineer for Open Government Products, GovTech ...

22:10
A Secure Vault - implementing authorization middleware with Casbin - JuniorDevSG

23,514 views

5 years ago

ByteGrad
Handle Permissions Like A Pro - Every Developer Should Know This

Critical things to understand about permissions (authorization) Permit (including a forever free tier): ...

21:28
Handle Permissions Like A Pro - Every Developer Should Know This

62,041 views

9 months ago

vlogize
Linking a Collection of Users to Policy Rules in Casbin RBAC Made Easy

Discover how to effectively link a collection of users to policy rules of a single resource using Casbin's `RBAC`, streamlining your ...

2:15
Linking a Collection of Users to Policy Rules in Casbin RBAC Made Easy

116 views

4 months ago

Hayk Simonyan
Authorization Explained: When to Use RBAC, ABAC, ACL & More

Become a Remote Senior Software Engineer with a Job Guarantee: ...

11:03
Authorization Explained: When to Use RBAC, ABAC, ACL & More

32,066 views

5 months ago

Permit
Easily create ABAC policies with the Permit UI - Tutorial

Join our Slack: https://bit.ly/permit-slack Read more about ABAC in our Docs: ...

11:15
Easily create ABAC policies with the Permit UI - Tutorial

9,626 views

3 years ago

Anthony GG
An Effective Way To Authorize Handlers In Golang

Join my Discord community for free education https://discord.com/invite/bDy8t4b3Rz ▻ Pre order (get 30% off) my exclusive ...

15:18
An Effective Way To Authorize Handlers In Golang

19,452 views

2 years ago

Lucas Barake
Best Way to Handle Permissions in TypeScript: RBAC & ABAC with Effect

Buy me a coffee! https://buymeacoffee.com/lucasbarake Blog: https://lucas-barake.github.io/building-a-composable-policy-system/ ...

12:21
Best Way to Handle Permissions in TypeScript: RBAC & ABAC with Effect

10,184 views

9 months ago

COSCUP 開源人年會
初試 Casbin - 快速搭建符合 99% 產品都需要的高彈性可維護之授權控制系統 | COSCUP x RubyConfTW 2021

相信開發人員都設計過權限功能,在不同程式語言也都有不同的框架與設定權限方法在服務切割越來越微細的世代,是不是有一種 ...

34:29
初試 Casbin - 快速搭建符合 99% 產品都需要的高彈性可維護之授權控制系統 | COSCUP x RubyConfTW 2021

1,509 views

4 years ago

Permit
RBAC vs. ABAC vs. ReBAC in under 5 minutes

Learn more about Permit ➡️ https://www.permit.io Join Permit Authorization Slack Community ➡️ io.permit.io/slack Get the best ...

4:24
RBAC vs. ABAC vs. ReBAC in under 5 minutes

8,559 views

1 year ago

Mastery Learning
Ken Thompson: Why did we create Golang?

Ken Thompson answers a question about the reason behind the creation of Golang at Google I/O 2012.

0:31
Ken Thompson: Why did we create Golang?

197,323 views

1 year ago

vlogize
Unlocking Role Matching by Pattern in Casbin

Discover how to achieve role matching by pattern in Casbin effectively, along with workarounds for complex policies. --- This video ...

2:02
Unlocking Role Matching by Pattern in Casbin

238 views

7 months ago

Hayk Simonyan
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO

Become a Remote Senior Software Engineer with a Job Guarantee: ...

6:04
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO

291,143 views

5 months ago

Fireship
Session vs Token Authentication in 100 Seconds

Learn the difference between session and token-based authentication on the web. Master Web Security in 12 weeks ...

2:18
Session vs Token Authentication in 100 Seconds

1,366,261 views

5 years ago

Milan Jovanović
How to Protect Endpoints with Role-Based Access Control in .NET

Support me on Patreon to access the source code: https://www.patreon.com/milanjovanovic ☄️ Master the Modular Monolith ...

14:18
How to Protect Endpoints with Role-Based Access Control in .NET

17,611 views

1 month ago

Erik Wilde
Role-Based Access Control (RBAC) Explained: How it works and when to use it

Role-Based Access Control (RBAC) is a popular model for access control in large organizations. The reason for this is that it ...

8:00
Role-Based Access Control (RBAC) Explained: How it works and when to use it

78,451 views

4 years ago

ManageEngine IAM and SIEM
Understanding CASB in one minute

Explore how organizations can stay protected against data exfiltration and shadow applications by using a cloud access security ...

1:22
Understanding CASB in one minute

9,815 views

3 years ago

Dipesh Malvia
Node js & Express Attribute Based Authorization Tutorial | How to Manage User Roles and Permission

Welcome to this in-depth tutorial where you'll learn to build a secure, scalable Attribute-Based Access Control (ABAC) system ...

43:18
Node js & Express Attribute Based Authorization Tutorial | How to Manage User Roles and Permission

12,784 views

1 year ago

Daz Jackson
MASS EFFECT 1 (LE) - CASBIN Map Locations Walkthrough

Locating all Points of Interest during a single sweep of the planet. Chapters: 00:00 Intro 01:05 Rare Element (Samarium) 04:05 ...

15:44
MASS EFFECT 1 (LE) - CASBIN Map Locations Walkthrough

63 views

2 months ago