Over a million developers have joined DZone.

5 Things You Didn’t Know Are Access Control

DZone's Guide to

5 Things You Didn’t Know Are Access Control

What is access control? And, where can you find it? Read this post to learn more about access control in our daily lives.

Free Resource

Discover how to provide active runtime protection for your web applications from known and unknown vulnerabilities including Remote Code Execution Attacks.

5 Things You Didn’t Know Are Access ControlEven for seasoned software developers, wading into the world of IAM (Identity & Access Management) and access control can be a bit intimidating. You need to consume a generous portion of alphabet soup — RBAC, ABAC, PBAC. Then, you must wrap your head around the complexities of roles, permissions, and so on.

But, at its core, access control is something anyone can understand. The phrase “access control” refers to application mechanisms that govern what each user can (or cannot) see and do.

Here are five features many people encounter every day that are access control… they just didn’t know it. Or they knew but forgot.

5. Personalization

When Jack goes to Amazon.com, he sees product recommendations, past orders, and so on. When Jill goes to Amazon, she sees her own recommendations and orders — not Jack’s. App builders usually refer to this as “personalization,” but, mechanically, it is just access control — code that ensures Jack sees his own data and cannot see Jill’s (or anyone else’s).

4. Parental Controls

When you set up a PIN on Netflix so your kids cannot watch so-called “adult” content, you are in essence creating access-control roles. In code, there’s little difference between “Administrator / Regular User” and “Parent / Child.”

Android Permissions Screen - Facebook App3. Mobile App Permissions

When you install an app on Android or iOS, you often see a screen listing all the stuff that the app wants to access on your device: GPS, your camera, SD card, and so on. You’re the boss here — the app is asking you to grant permissions — but it’s still access control.

2. Hotel Keycards

In many modern hotels — especially those catering to business travelers — your room is opened with a keycard. The reusable card is programmed at check-in by a “card writer” connected to the room-management software. In some systems, the card can be programmed to open any combination of rooms, for instance, your own room or the gym. Thanks to these cards, access control can treat a physical resource as if it were a software feature.

1. Network Firewalls

Firewalls can be software — like the venerable but still serviceable iptables in Linux — or they can be devices, either from your garden-variety home router to industrial-strength systems from the likes of Cisco. All of them, however, do roughly the same thing: govern which data packets get through from one network to another, where they can come from and where they can go.

Find out how Waratek’s award-winning application security platform can improve the security of your new and legacy applications and platforms with no false positives, code changes or slowing your application.

security ,access control ,permissions ,parent controls ,firewalls

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}