Σύστημα ελέγχου πρόσβασης βασισμένο σε ρόλους
Role based access control system
View/ Open
Keywords
Role-based access control ; RBAC ; Authorization management ; Security ; Access permissions ; Role management ; Corporate systems ; Web application development ; TypeScript ; React ; JavaScript ; Ant design ; Axios ; Go (programming language) ; Gin framework ; Casbin ; GORMAbstract
This thesis explores the development and implementation of a Role-Based Access Control (RBAC) system, tailored to a digital marketing company’s needs. The central notion of RBAC is that users do not have direct access to enterprise objects. Instead, access permissions are administratively associated with roles, and users are administratively made members of appropriate roles. This idea greatly simplifies system authorization management, while providing an opportunity for great flexibility in specifying and enforcing enterprise-specific protection policies. Users can be made members of roles, as determined by their responsibilities and qualifications and can be easily reassigned from one role to another, without modifying the underlying access structure. Roles can be granted new permissions as new applications and actions are incorporated, and permissions can be revoked from roles as needed.
This work provides an in-depth analysis of the evolution of RBAC systems and the current technologies used to implement them. The front-end of the application is developed using TypeScript, React, Ant Design, and Axios, while the back-end utilizes Go, Gin Framework, Casbin, and GORM. Additionally, this thesis also details the implementation of a supplementary digital platform (Portal), aimed at both members and clients of the company, in order to better showcase the functionalities and capabilities of the main application. The results demonstrate that an RBAC system, due to the flexibility and freedom it offers in its design, is capable of being implemented in any corporate system, regardless of the specifics or complexity of its structure. Thus, it becomes an ideal solution for data security, suitable for both small and medium-sized businesses, as well as larger, multinational corporations.