You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Where permissions are associated to roles and users have a specific role attache
50
50
51
51
#### 3. Role Based Permissions with User Level Flexibility
52
52
53
-
This is the most flexible architecture. In this case, method #2 is implemented as is.
53
+
This is the most flexible architecture. In this case, method #2 is implemented as is.
54
54
55
55
On top of it, we also add user-level permissions override, allow/deny permissions over role permissions. So, say there is user who can perform all admin role actions except he cannot remove users from the system. So, DeleteUser permission can be denied at user level and role can be set as Admin for the user.
56
56
@@ -150,7 +150,7 @@ export class User extends Entity implements UserPermissionsOverride<string> {
150
150
151
151
#### User Permissions Provider
152
152
153
-
For method #3, This extension exposes a provider function [AuthorizationBindings.USER_PERMISSIONS](https://github.com/sourcefuse/loopback4-authorization/blob/master/src/providers/user-permissions.provider.ts) to evaluate the user permissions based on its role permissions and user-level overrides.
153
+
For method #3, This extension exposes a provider function [AuthorizationBindings.USER_PERMISSIONS](https://github.com/sourcefuse/loopback4-authorization/blob/master/src/providers/user-permissions.provider.ts) to evaluate the user permissions based on its role permissions and user-level overrides.
154
154
155
155
Just inject it like below:
156
156
@@ -307,7 +307,7 @@ API endpoints provided by ARC API (aka Sourceloop) services have their permissio
307
307
In order to override them you can bind your custom permissions in the `AuthorizationBindings.PERMISSION` binding key.
308
308
This accepts an object that should have Controller class name as the root level key and the value of which is another object of method to permissions array mapping.
You can easily check the name of the controller and it's method name from the source code of the services or from the Swagger UI (clicking the endpoint in swagger append the controller and method name in the URL like `LoginController.login` where `login` is the method name).
325
+
You can easily check the name of the controller and it's method name from the source code of the services or from the Swagger UI (clicking the endpoint in swagger append the controller and method name in the URL like `LoginController.login` where `login` is the method name).
0 commit comments