mamot.fr is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mamot.fr est un serveur Mastodon francophone, géré par La Quadrature du Net.

Server stats:

3.3K
active users

#rbac

0 posts0 participants0 posts today
N-gated Hacker News<p>GitHub's latest buzzword soup—'Gatehouse'—mixes <a href="https://mastodon.social/tags/RBAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RBAC</span></a>, <a href="https://mastodon.social/tags/ABAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ABAC</span></a>, and <a href="https://mastodon.social/tags/ReBAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReBAC</span></a> into a Rusty casserole of confusion 🍲🔧. Promising async-friendly code like a vitamin commercial promises eternal youth, but only time will tell if it’s a miracle or just another overhyped tech smoothie 🥤🤖.<br><a href="https://github.com/thepartly/gatehouse" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/thepartly/gatehouse</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> <a href="https://mastodon.social/tags/Gatehouse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gatehouse</span></a> <a href="https://mastodon.social/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
Oleksii<p><span class="h-card" translate="no"><a href="https://mastodon.social/@christianhuth" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>christianhuth</span></a></span> Thanks for sharing. Are you using any <a href="https://social.linux.pizza/tags/RBAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RBAC</span></a> management tools except vanilla kubernetes?</p>
Paul Sanders 😎<p>Are you supporting an <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> landing zone? </p><p>Did you know that you can use <a href="https://infosec.exchange/tags/PIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PIM</span></a> to protect access to your resources? </p><p>Using <a href="https://infosec.exchange/tags/RBAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RBAC</span></a> and <a href="https://infosec.exchange/tags/EntraID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EntraID</span></a> groups, you can build out a pretty robust approval model. I recently updated a blog with details on how to do it for <a href="https://infosec.exchange/tags/Yobah" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yobah</span></a>. </p><p><a href="https://yobah.co.uk/blog/securing-your-azure-landing-zone-with-pim" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yobah.co.uk/blog/securing-your</span><span class="invisible">-azure-landing-zone-with-pim</span></a></p>
meneer<p>I had a nice conversation about the future of <a href="https://social.iamforum.space/tags/IGA" rel="nofollow noopener noreferrer" target="_blank">#IGA</a> in the Identerati Office Hours webcast by Mike Schwartz from <a href="https://social.iamforum.space/tags/Gluu" rel="nofollow noopener noreferrer" target="_blank">#Gluu</a>. You can see me have a talk with Radovan and Slavek from <a href="https://social.iamforum.space/tags/Evolveum" rel="nofollow noopener noreferrer" target="_blank">#Evolveum</a> (<a href="https://social.iamforum.space/tags/Midpoint" rel="nofollow noopener noreferrer" target="_blank">#Midpoint</a> IGA) at <a href="https://www.linkedin.com/posts/nynymike_episode-76-the-future-of-iag-join-us-activity-7279951630219821056-p9qk" rel="nofollow noopener noreferrer" target="_blank">https://www.linkedin.com/posts/nynymike_episode-76-the-future-of-iag-join-us-activity-7279951630219821056-p9qk</a><span><br><br>We covered these topics:<br></span><a href="https://social.iamforum.space/tags/RBAC" rel="nofollow noopener noreferrer" target="_blank">#RBAC</a> <a href="https://social.iamforum.space/tags/PBAC" rel="nofollow noopener noreferrer" target="_blank">#PBAC</a> <a href="https://social.iamforum.space/tags/digitalidentity" rel="nofollow noopener noreferrer" target="_blank">#digitalidentity</a> <a href="https://social.iamforum.space/tags/IDPro" rel="nofollow noopener noreferrer" target="_blank">#IDPro</a> <a href="https://social.iamforum.space/tags/NHI" rel="nofollow noopener noreferrer" target="_blank">#NHI</a> (non-human identities)</p>
Paco Hope #resist<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@patrickcmiller" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>patrickcmiller</span></a></span> They left out the authorisation model. All <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> systems I have seen have a binary authorisation model: an entity is allowed to inference against the model, or not. Contrast with relational databases where you can have access to some tables and not others. We can even get to row-level and column-level access controls. Just because you can query the database doesn’t mean the whole of the dataset is available to you. Data in the database that matches your query might be missing from your response because you don’t have access to those items.</p><p>With an <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> the entire trained model is available for inference. To put it in <a href="https://infosec.exchange/tags/RBAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RBAC</span></a> terms, every distinct role with distinct access to subsets of data would need its own model, trained only on the data they’re allowed to access. </p><p>In practice no one does that. So models either include too much data, risking exposure to unauthorised users, or they omit useful data in training because they don’t want the risk. Middle ground solutions are rare and difficult.</p>