P5-tree-authz

Jul 20, 2023

Role-Based Access Control authorization scheme

Class for inheritable, role-based permissions system Role Based Access Control - RBAC.

Custom methods can be placed on role objects. Authorization can be performed either by checking whether the role name matches the required name, or by testing via can whether the role can perform the method required.

Two role are specified by default. At the top, superusers can do anything $superuser->can $action always returns a coderef. At the bottom, the base role can do nothing $base->can $action always returns undef.

All roles are automatically capable of authorizing actions named for the singular and plural of the role name.



Checkout these related ports:
  • Zzuf - Transparent application input fuzzer
  • Zlint - X.509 certificate linter
  • Zeronet - Decentralized websites using Bitcoin crypto and BitTorrent network
  • Zenmap - GUI frontend for the Nmap scanning utility
  • Zeek - System for detecting network intruders in real-time
  • Zaproxy - The OWASP zed attack proxy
  • Yubioath-desktop - GUI for displaying OATH codes with a Yubikey
  • Yubikey-personalization-gui - Graphical YubiKey personalization tool
  • Yubikey-manager-qt - Cross-platform application for configuring any YubiKey
  • Yubikey-agent - Seamless ssh-agent for YubiKeys
  • Yubico-piv-tool - Yubico PIV tool
  • Ylva - Command line password manager and file encryption program
  • Ykpers - Library and tool for personalization of Yubico's YubiKey
  • Ykclient - Yubico C client library
  • Yersinia - Layer 2 vulnerability scanner (switches, spanning tree, 802.1q ...)