Chapter 11. Access Control Requirement Patterns
In this chapter:
11.1 User Registration Requirement Pattern 284
11.2 User Authentication Requirement Pattern 295
11.3 User Authorization Requirement Patterns 305
11.4 Specific Authorization Requirement Pattern 308
11.5 Configurable Authorization Requirement Pattern 313
11.6 Approval Requirement Pattern 318
Access control lets us nominate all the people we’re prepared to let in, check each one’s identity when they visit, limit their access to only what they should see and do, and see who did what—so we needn’t trust anyone more than we have to. These are essential features of almost every serious commercial system, and few do it well.
Access control ...
Get Software Requirement Patterns now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.