Skip to content

Commit 00c81f4

Browse files
committed
Remove roles & auth
1 parent 353246b commit 00c81f4

File tree

1 file changed

+0
-6
lines changed

1 file changed

+0
-6
lines changed

docs/getting-started/harper-concepts.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,6 @@ Resources in Harper encompass databases, tables, and schemas that store and stru
1717
Harper is a multi-protocol server, handling incoming requests from clients and serving data from the data model. Harper supports multiple server protocols, with components for serving REST/HTTP (including Server-Sent Events), MQTT, WebSockets, and the Operations API (and custom server components can be added). Harper uses separate layers for the data model and the servers. The data model, which is defined with resources, can be exported and be used as the source for any of the servers. A single table or other resource can then be accessed and modified through REST, MQTT, SSE, or any other server protocol, for a powerful integrated model with multiple forms of access.
1818
Networking in Harper handles different communication protocols including HTTP, WebSocket, and MQTT, as well as event-driven systems. These networking capabilities enable Harper applications to communicate with other services, receive requests, send responses, and participate in real-time data exchange. The networking layer is fundamental to Harper's functionality as a versatile application platform.
1919

20-
## Authentication
21-
Authentication in Harper provides security mechanisms to verify user identities before granting access to system resources and functionality. This concept is essential for securing Harper deployments and ensuring that only authorized users can access sensitive data or perform privileged operations within applications built on the Harper platform.
22-
23-
## Roles
24-
Roles in Harper define permissions and access levels for different users within the system. They work in conjunction with authentication to create a comprehensive security model that controls what authenticated users can do once they access the system. Roles help implement principle of least privilege and segregation of duties within Harper applications.
25-
2620
__
2721

2822
As you go through Harper, you will pick up more knowledge of other advanced areas along the way, but with these concepts, you're now ready to create your first application.

0 commit comments

Comments
 (0)