Flexible & Correct Identity Access Control Models

1 · CockroachDB · April 1, 2022, 8 p.m.
One mistake that should never be made is to assume permissions and identity access are easy. If you plan on just throwing some rows in the database and then making an authorization decision based on the existence (or nonexistence) of a row… then you might not be “secure”. And further, once you are successful, you should also start to consider a scalable and more accurate approach. Identity and access management (IAM) is a critical part of an application (Security!...