121 packages tagged with “Roles”
Library of core security framework for implementing role-based security with integrated Active Directory, local account and database style authentication across various .NET application types.
free OSS version of PolicyServer
Authorization Framework Library for ASP.NET Core. For more information see http://github.com/Xabaril/Balea
Claims-based user account and identity management framework
API store support for Balea Server. For more information see http://github.com/Xabaril/Balea
A XrmToolBox tool to copy a users roles, teams or queues to multiple users
A small and simple library that allows you to easily manage permissions in your .NET projects.
Configuration store support for Balea. For more information see http://github.com/Xabaril/Balea
Roles Base Access Control for Azure active directory.
EntityFrameworkCore store support for Balea. For more information see http://github.com/Xabaril/Balea
Access Security Roles for multiple roles/entities and produce architecture Security Model artifacts/documents in Microsoft Dynamics 365
Defines an architecture of persistent users, roles and privileges that can be used to provide detailed authorization in applications. Privileges are ordered in a tree structure. Roles contains a list of allowed privileges (nodes or entire branches), or explicitly prohibited privileges (nodes or branches). Each user can be assigned one or more roles. Credentials are protected using hash digests. Objects are persisted through the object database abstraction layer, defined in Waher.Persistence.
Restores Kentico Generic Roles of _authenticated_ _notauthenticated_ and _everyone_ with code to automatically create and maintain these listings. This should be installed on both the Admin (Mother) and Site (MVC)
Suplex.Security is an application security and RBAC abstraction Layer. Implments hierarchical DACL model and common RBAC model. Suplex Security contains thte POCOs.
Temporary Community Implementation of Member Roles for Xperience by Kentico (Until Kentico implements this). Install XperienceCommunity.MemberRoles.Admin instead of this if doing simple installation. This package contains Kentico Agnostic Interfaces.
Allows easy IP address access filtering by simply adding an attribute to MVC controller or controller action. It supports: - single IP address filtering - multiple IP address filtering - single IP address range filtering - multiple IP address range filtering - a list of roles with linked IP addresses Forked from https://github.com/dejanstojanovic/IP-Address-Filtering
Identifies which Dynamics 365 users are compliant to the Team Members use Rights
A Cosmos DB implementation of ASP.NET Core Identity.
Temporary Community Implementation of Member Roles for Xperience by Kentico (Until Kentico implements this). Install XperienceCommunity.MemberRoles.Admin instead of this if doing simple installation. This package contains the logic and Installer.
Suplex.Security is an application security and RBAC abstraction Layer. Implments hierarchical DACL model and common RBAC model. Suitable for use in any application/API. Suplex.Security FileSystemDal wraps the MemoryDal for file persistence.
Lightweight library for implementing roles-based access control (RBAC). With Gatekeeper, you can define users, roles, resources, and permissions, and authorize requests.
This package include a custom implementation of ActiveDirectoryMembershipProvider which allowes for caching and return of displayname. It also includes a RoleProvider leveraging LDAP group as roles (lacks support for adding and deleting roles). Configuration for the provider, read http://msdn.microsoft.com/en-us/library/system.web.security.activedirectorymembershipprovider.aspx for more info <add name="DirectoryServicesMembershipProvider" type="ASystems.DirectoryServicesProviders.DirectoryServicesMembershipProvider, ASystems.DirectoryServicesProviders" connectionStringName="ADService" connectionUsername="UserWithAppropriateRights" <!-- remove for apppool credentials --> connectionPassword="PasswordForUser" <!-- remove for apppool credentials --> connectionProtection="Secure" <-- Secure, None --> cache="15" <!-- minutes to cache, 0 to disable caching --> allowedRoles="" <!-- comma separated string with groups, or name of appsetting containing the comma separated groups --> enableUpdate="true" enablePasswordReset="true" enableSearchMethods="true" requiresQuestionAndAnswer="true" applicationName="/" description="Default AD connection" requiresUniqueEmail="false" clientSearchTimeout="30" serverSearchTimeout="30" attributeMapPasswordQuestion="department" attributeMapPasswordAnswer="division" attributeMapFailedPasswordAnswerCount="singleIntAttribute" attributeMapFailedPasswordAnswerTime="singleLargeIntAttribute" attributeMapFailedPasswordAnswerLockoutTime="singleLargeIntAttribute" attributeMapEmail = "mail" attributeMapUsername = "userPrincipalName" <!-- userPrincipalName, sAMAccountName --> attributeMapProviderUserKey = "objectSid" <!-- objectSid, objectGUID --> additionalAttributes = "" <!-- comma separated string with attributes that are included in search results --> maxInvalidPasswordAttempts = "5" mergeWith="NameOfMembershipProvider" <!-- use to combine users from multiple providers --> mergeStyle="After" <!-- After, Before --> passwordAttemptWindow = "10" passwordAnswerAttemptLockoutDuration = "30" minRequiredPasswordLength="7" minRequiredNonalphanumericCharacters="1" passwordStrengthRegularExpression="@\"(?=.{6,})(?=(.*\d){1,})(?=(.*\W){1,})"" /> <add name="DirectoryServicesRoleProvider" type="ASystems.DirectoryServicesProviders.DirectoryServicesRoleProvider, ASystems.DirectoryServicesProviders" connectionStringName="ADService" connectionUsername="UserWithAppropriateRights" <!-- remove for apppool credentials --> connectionPassword="PasswordForUser" <!-- remove for apppool credentials --> connectionProtection="Secure" <-- Secure, None --> cache="15" <!-- minutes to cache, 0 to disable caching --> useOrganisationalUnits="false" <!-- use organisational units as role instead of groups --> mergeWith="NameOfRoleProvider" <!-- use to combine roles from multiple providers --> mergeStyle="After" <!-- After, Before, Mixed --> applicationName="/" attributeMapUsername = "userPrincipalName" <!-- userPrincipalName, sAMAccountName --> />
Customizes Blazor WebAssembly authentication by extending AccountClaimsPrincipalFactory to add user roles based on their job title.
A library to handle Auth0 more Easily for the InfiniLore server
A flexible Role Based Access Control library that's simple to setup and configure.
Temporary Community Implementation of Member Roles for Xperience by Kentico (Until Kentico implements this). This package inherits all the other packages, and additionally contains the Admin UI elements.