Tag: access-control

Found 308 results for 'access-control'.

1) linux - Using /usr/bin/passwd as login shell
2) access-control - Full-disk encryption and theft mitigation?
3) root - su: cannot open session: Permission denied
4) find - Can I disable command execution in find
5) linux - Do root's supplementary groups behave differently than regular account ones for NFS shares?
6) access-control - What are the risks resulting from having a switch without strong access control directly facing the Internet?
7) systemd - Restarting systemd service only as a specific user?
8) git - Setting up a git server with ssh access
9) public-key - What is the relationship between attribute based encryption (ABE) and access control?
10) oblivious-transfer - Access control problem in oblivious transfer
11) access-control - How secure is the web-based file browser that comes with my NAS?
12) linux - Can the root user be removed from a *nix system to prevent privilege-escalation?
13) web-application - Convert customer tracking system from web access to REST
14) operating-systems - Given SSH access, what should I do to protect a server and monitor (dangerous) user actions?
15) passwords - Is Linux really that secure, with only root password denying external access?
16) tls - Certificate based Access Control for Pub Sub messaging
17) authentication - How do I log everything a certain program is doing?
18) access-control - Could it be possible to diminish the damage of having one's VPS inspected by the host?
19) tls - Access control for embedded device
20) access-control - Security implications of granting IIS user group folder modify permissions
21) access-control - Are there a standard method(s) for me to give someone else read-only access to my data?
22) appsec - Why do some Java APIs bypass standard SecurityManager checks?
23) access-control - What methods are websites using to prevent direct access to media?
24) signature - Use of crypto on QR codes for access control
25) authentication - How to handle refresh tokens
26) authentication - JWT access token and refresh token
27) web-browser - Vertical information portal security with a customized web browser
28) passwords - How do I control an access code safely?
29) tls - Possible to limit server connections to clients with a specific certificate?
30) encryption - Better techniques than url parameter encryption
31) systemd - Can systemd do some setup before forking as a user?
32) network - Comprehensive audit of firewall - is Internet truly not accessible?
33) ssh - Is SSH server secure from internet access outside private network?
34) access-control - Best practice for selective opening of ports on network gateway
35) database - Duplication of view access control logic in database queries and application component
36) database-design - How to design role based access control?
37) security - Role vs Permission Based Access Control
38) architecture - Where to put domain knowledge for Authorization?
39) architecture - Customized access control using OAuth 2.0
40) permissions - Should "special" roles exist in an ARO system?
41) design-patterns - How best to design Access Control Layer in n-tier architecture application
42) rest - REST API and user rights
43) security - Privilege (Access/Permission) Control for Hierarchial Structured Resource
44) security - OWASP Broken Access Control by example: preventing user's from reading/writing data that isn't theirs
45) passwords - Is it advisable to have a web browser remember login credentials?
46) programming-practices - When should a private method take the public route to access private data?
47) authentication - Can an identity provider impersonate me? (Can Facebook post Stack Overflow questions under my name?)
48) access-control - Disable internet access of development PC for security
49) web-application - Can I use a vpn to securely use prototypes of webapps from my phone or laptop?
50) access-control - SUID exploit and patch