About 3,010,000 results
Open links in new tab
  1. Access Control in Domain Driven Design - Stack Overflow

    May 5, 2014 · I read about DDD and Access Control, and I found some contradiction between the following two opinions: "security concerns should be handled outside the domain" "access …

  2. When reviewing security as a service within DDD, it is clear that when access control is only based on the role of a user, security functionality can be located in a security service with low …

  3. domain driven design - Implementing DDD: users and permissions ...

    Mar 14, 2018 · By pulling the permissions to the core domain and checking them in the methods of the domain objects or in the services, I'd end up at square one: mixing security concerns …

  4. Acess Control Lists and Capability Lists - homepage.cs.uiowa.edu

    ddd -- Bob:R, Carol:R, Dave:R. Note, with access control lists, that we only list users who have access to some file, omitting from the list those users who have no access. It should be …

  5. Authentication and Authorization in DDD | by José Luis ... - Medium

    Jan 8, 2016 · As I’m a great enthusiast of Domain-Driven Design, I wonder what are the best approaches to use authentication/authorization in DDD. In the following lines I show two …

  6. Where to put security when using DDD - domain driven design

    Sep 5, 2016 · Security and permissions should be centralized in its own bounded context, which is then used by other bounded contexts. Have a look at the Identity Access bounded context for …

  7. Security and Authentication | jkazama/ddd-java | DeepWiki

    This document details the security and authentication mechanisms in the ddd-java application. The system implements a simplified approach to user authentication and role-based access …

  8. Understanding Security in Domain-Driven Design

    Security is a critical aspect of software design, particularly in Domain-Driven Design (DDD). In this lesson, we will explore how to incorporate security measures into the DDD approach and …

  9. design - Where should the user access bounded context stands in DDD

    Nov 30, 2021 · On most applications, The login system does not belong in the domain layer. Unless your application focuses on authentication (e.g. you are developing security software …

  10. Securing Use Cases in Clean Architecture | by George - Medium

    Nov 20, 2022 · This later case calls for implementation of Domain Object security of which Attribute-based Access Control (ABAC) is one of the most commonly used types. Where to …

Refresh