The access management component verifies user authentication and authorization for an application, allowing users to access or be denied access to specific objects based on their permissions.
One of the core benefits of this component is that it reduces development costs by providing reliable third-party software. Additionally, it is incredibly flexible and can be successfully integrated into an application at any stage of the project. The security scheme implemented by the component is also easy to modify. Developers don't have to modify their application's source code to add new access rules; instead, new access rules can be quickly and easily integrated using this component.
The mechanism by which this component works is by organizing users into groups, or roles. Access rules are then defined for each group, rather than for individual users, offering a more streamlined approach. All objects in the application are arranged within a hierarchical structure, with a root object at the top level. The user's list of roles is inherited as they move between different levels of structure.
Each object within the application has an associated access class which contains a set of rules. When a user requests a specific operation, the system checks the access class of the corresponding object, looking for a matching rule to determine access permission. If a rule is not found, the operation is considered as being forbidden.
Access classes can inherit rules from a base class, and developers can create an implicit class to apply special access rules for selected objects. By offering this comprehensive range of features, this component provides an invaluable tool for developers looking to secure their applications.
Version 4.1.0: N/A