ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

632 results

IBM Technology
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

Get the threat intelligence guide → https://ibm.biz/BdmwNZ Learn about the technology → https://ibm.biz/BdmwNY Exploring the ...

7:39
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

135,457 views

1 year ago

Web Dev Simplified
How To Handle Permissions Like A Senior Dev

Try Clerk: https://go.clerk.com/b2b-orgs Permission systems are in every single app, but most developers don't spend any time ...

36:39
How To Handle Permissions Like A Senior Dev

608,454 views

1 year ago

ByteGrad
Handle Permissions Like A Pro - Every Developer Should Know This

Critical things to understand about permissions (authorization) Permit (including a forever free tier): ...

21:28
Handle Permissions Like A Pro - Every Developer Should Know This

61,840 views

9 months ago

Engineers.SG
A Secure Vault - implementing authorization middleware with Casbin - JuniorDevSG

Speaker: Christabel Neo Christabel Neo works as Associate Software Engineer for Open Government Products, GovTech ...

22:10
A Secure Vault - implementing authorization middleware with Casbin - JuniorDevSG

23,498 views

5 years ago

Permit
Easily create ABAC policies with the Permit UI - Tutorial

Join our Slack: https://bit.ly/permit-slack Read more about ABAC in our Docs: ...

11:15
Easily create ABAC policies with the Permit UI - Tutorial

9,610 views

3 years ago

Hayk Simonyan
Authorization Explained: When to Use RBAC, ABAC, ACL & More

Become a Remote Senior Software Engineer with a Job Guarantee: ...

11:03
Authorization Explained: When to Use RBAC, ABAC, ACL & More

31,744 views

4 months ago

vlogize
Linking a Collection of Users to Policy Rules in Casbin RBAC Made Easy

Discover how to effectively link a collection of users to policy rules of a single resource using Casbin's `RBAC`, streamlining your ...

2:15
Linking a Collection of Users to Policy Rules in Casbin RBAC Made Easy

115 views

4 months ago

Lucas Barake
Best Way to Handle Permissions in TypeScript: RBAC & ABAC with Effect

Buy me a coffee! https://buymeacoffee.com/lucasbarake Blog: https://lucas-barake.github.io/building-a-composable-policy-system/ ...

12:21
Best Way to Handle Permissions in TypeScript: RBAC & ABAC with Effect

10,152 views

9 months ago

COSCUP 開源人年會
初試 Casbin - 快速搭建符合 99% 產品都需要的高彈性可維護之授權控制系統 | COSCUP x RubyConfTW 2021

相信開發人員都設計過權限功能,在不同程式語言也都有不同的框架與設定權限方法在服務切割越來越微細的世代,是不是有一種 ...

34:29
初試 Casbin - 快速搭建符合 99% 產品都需要的高彈性可維護之授權控制系統 | COSCUP x RubyConfTW 2021

1,506 views

4 years ago

Permit
RBAC vs. ABAC vs. ReBAC in under 5 minutes

Learn more about Permit ➡️ https://www.permit.io Join Permit Authorization Slack Community ➡️ io.permit.io/slack Get the best ...

4:24
RBAC vs. ABAC vs. ReBAC in under 5 minutes

8,539 views

1 year ago

Mastery Learning
Ken Thompson: Why did we create Golang?

Ken Thompson answers a question about the reason behind the creation of Golang at Google I/O 2012.

0:31
Ken Thompson: Why did we create Golang?

196,591 views

1 year ago

vlogize
Unlocking Role Matching by Pattern in Casbin

Discover how to achieve role matching by pattern in Casbin effectively, along with workarounds for complex policies. --- This video ...

2:02
Unlocking Role Matching by Pattern in Casbin

238 views

7 months ago

Fireship
Session vs Token Authentication in 100 Seconds

Learn the difference between session and token-based authentication on the web. Master Web Security in 12 weeks ...

2:18
Session vs Token Authentication in 100 Seconds

1,365,081 views

5 years ago

Milan Jovanović
How to Protect Endpoints with Role-Based Access Control in .NET

Support me on Patreon to access the source code: https://www.patreon.com/milanjovanovic ☄️ Master the Modular Monolith ...

14:18
How to Protect Endpoints with Role-Based Access Control in .NET

17,299 views

1 month ago

Hayk Simonyan
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO

Become a Remote Senior Software Engineer with a Job Guarantee: ...

6:04
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO

287,126 views

5 months ago

Erik Wilde
Role-Based Access Control (RBAC) Explained: How it works and when to use it

Role-Based Access Control (RBAC) is a popular model for access control in large organizations. The reason for this is that it ...

8:00
Role-Based Access Control (RBAC) Explained: How it works and when to use it

78,372 views

4 years ago

ManageEngine IAM and SIEM
Understanding CASB in one minute

Explore how organizations can stay protected against data exfiltration and shadow applications by using a cloud access security ...

1:22
Understanding CASB in one minute

9,806 views

3 years ago

Anthony GG
An Effective Way To Authorize Handlers In Golang

Join my Discord community for free education https://discord.com/invite/bDy8t4b3Rz ▻ Pre order (get 30% off) my exclusive ...

15:18
An Effective Way To Authorize Handlers In Golang

19,439 views

2 years ago

Dipesh Malvia
Node js & Express Attribute Based Authorization Tutorial | How to Manage User Roles and Permission

Welcome to this in-depth tutorial where you'll learn to build a secure, scalable Attribute-Based Access Control (ABAC) system ...

43:18
Node js & Express Attribute Based Authorization Tutorial | How to Manage User Roles and Permission

12,715 views

1 year ago

Ssali Jonathan
Role-Based Access Control Using Dependency Injection (User Roles) - FastAPI Beyond CRUD (Part 13)

Role-Based Access Control Using Dependency Injection In this video, we're setting up role-based access control for our API ...

32:27
Role-Based Access Control Using Dependency Injection (User Roles) - FastAPI Beyond CRUD (Part 13)

10,894 views

1 year ago