What are the different types of [complicated] authorization solutions (besides role-based and ACL) ones?

0 投票
最新提问 用户: (120 分)

I thought it would be great to have a page that lists all sorts of authorization systems in one place.

I guess that stackoverflow.com would prefer if we used their documentation portal, but I'm not familiar with it at all.

As a developer I always wanted to know the various ways you can implement authorization. Everyone is familiar with the role-based approach, but let us not get into that solution, as it's the most basic form. A lot of times clients are interested in very complicated authorization solutions.

I presume ACL is the way to go, but maybe there are other [standardized] systems? I think that even ACL can be implemented in various ways too.

So, guys, lets write some of the solutions here. All answers and links to articles are welcome.

登录 或者 注册 后回答这个问题。

欢迎来到 Security Q&A ,有什么不懂的可以尽管在这里提问,你将会收到社区其他成员的回答。