Skip to main content

Questions tagged [access-control]

A security mechanism which enforces policy describing which requesters may perform operations on specified objects. There are typically multiple types of operations. Common operations include: read, write, execute, append, create, and delete.

1 vote
0 answers
82 views

A recurring problem when implementing authorisation checks using procedural code is that you end up duplicating a lot of checks across your codebase and it is easy to forget to apply a check, or ...
Polynomial's user avatar
  • 136k
2 votes
0 answers
72 views

NB> This is not technical question but rather attempt to grasp the model and its natural restrictions. I am thinking of Step-up authorization and Separation of Duty scenarios where either the same ...
bada's user avatar
  • 21
2 votes
1 answer
85 views

The four control categories are Technical, Managerial, Operational, and Physical, according to most sources about the Sec+ exam. Even this seems to be, for lack of a better term, controversial. Some ...
Sam's user avatar
  • 23
1 vote
1 answer
139 views

Let's say a user requires admin privileges as part of their role for installation of required tooling. Would allowing them a separate admin account to perform these activities be best practice as ...
Ake33's user avatar
  • 11
0 votes
0 answers
112 views

In an IPsec Secure gateway setup, why is tunnel-mode used when an external laptop wants to access an internal service protected by a firewall? Is tunnel-mode necessary or could transport-mode be used ...
Allexj's user avatar
  • 137
0 votes
1 answer
1k views

I want to create a server where after the user logs the server gives them a randomly generated access token that is hashed using SHA256, that I store in the database a long with an expiration date, I ...
a_duck's user avatar
  • 73
0 votes
0 answers
124 views

I am getting the idea that Doorking's ProxPlus cards and reader have a pre-defined encryption key in their reader. As these readers are wiegand devices and the software for the Doorking Access systems ...
steve vogel's user avatar
1 vote
1 answer
626 views

Let's say I have an e-commerce organization. My organization has two security authorities A and B. The authority A manages access to data related to user orders, and the authority B manages access to ...
mateleco's user avatar
  • 110
0 votes
1 answer
398 views

In AWS Cognito we could define a role/permissions as a custom attribute in the user pool, but we could have a User table and a caching database and fetch roles each time the user does a request. Of ...
Vitor Figueredo Marques's user avatar
0 votes
2 answers
2k views

I'm developing a HTTP web server. I've used HTTPS as the protocol between client and server but I know that HTTPS can't prevent parameter tampering. As we know, we can set parameters in URL, in HTTP ...
Yves's user avatar
  • 361
2 votes
1 answer
332 views

Suppose I have an Admin account and a normal user account. There is some functionality that is only accessible to the admin only, like promoting other users. In this scenario, I captured a request ...
infosec_learner's user avatar
1 vote
0 answers
289 views

I am not an infosec professional, but I'm working on a project that requires designing and implementing a permission system for a customer. The system the customer proposes is as follows: Users are ...
Oscar's user avatar
  • 11
3 votes
1 answer
371 views

As per the below resource: https://www.oauth.com/oauth2-servers/redirect-uris/redirect-uri-validation/ we should validate the redirect url at 3 points: at time of app registration when the auth flow ...
gaurav5430's user avatar
3 votes
2 answers
222 views

Context A small web application with REST API and postgres as db, that has users, documents and teams. A user can do basic CRUD operations on document. A user is always a part of a team. A team is ...
iovo's user avatar
  • 33
1 vote
0 answers
840 views

I am testing an app and I found a link in source code that permit me to access a document without authenticating to the application on which that document is present. The url has a key in the get and ...
moskino11's user avatar
  • 127

15 30 50 per page
1
2 3 4 5
39