Daniel Bass
Protecting Democracy Through Fine-Grained Authorization
See how Maricopa County used Fine-Grained Authorization (FGA) to secure its voting system. A case study for developers protecting data in large-scale operations
Daniel Bass
See how Maricopa County used Fine-Grained Authorization (FGA) to secure its voting system. A case study for developers protecting data in large-scale operations
Daniel Bass
Learn how to protect user data from AI crawlers with Fine-Grained Authorization (FGA) by Identifying bots, classifying data, and empowering users with control.
Daniel Bass & Gabriel L. Manor
A guide to the most common access control terms. Learn how to integrate MAC and DAC and RBAC, and how the rise of FGA can help your application access control.
Daniel Bass
Today, we are excited to announce the launch of Permit.io’s latest feature: Permit Share-If.
Daniel Bass
Attribute-Based Access Control (ABAC) and Relationship-Based Access Control (ReBAC) - how to make the most suitable choice for your application?
Daniel Bass
Discover how Discord built "Access!" - a secure, user-friendly portal for managing authorization, and what should you use to cover your entire user stack.
Daniel Bass
Google designed its Zanzibar authorization system to handle its complex access needs. See how you can leverage this to create fine-grained ReBAC in your app
Daniel Bass
Learn best practices for managing user roles and access delegation and how to implement a cascading authorization model to enhance your app's access control.
Daniel Bass
Learn how to quickly create and implement custom user experiences for your application with User Attributes and Feature Flags
Daniel Bass
Learn how to use JWT for authorization, understand the basics of what JWT is, and explore examples of proper JWT usage in authentication and authorization.
Daniel Bass
Learn how to build cloud-native authorization systems with CI/CD, thorough testing, and precise modeling and implementation.
Daniel Bass
10 topics, 45 questions: Authorization is part of every app—here are the questions you NEED to ask yourself before you implement this critical security feature