Home / Companies / Hasura / Blog / Post Details
Content Deep Dive

Hasura Authorization System through Examples

Blog post from Hasura

Post Details
Company
Date Published
Author
Gautam BT
Word Count
1,604
Language
English
Hacker News Points
-
Summary

This article discusses the implementation of authorization systems using Hasura's JSON-based DSL. It provides a brief overview of Hasura's authorization system and explains how to create new roles, set permissions for select, insert, update, and delete operations on tables in the schema. The text then delves into real-world examples such as simple role-based access control, per-resource roles, hierarchical roles, and attribute-based access control. It also touches upon using views to handle more complex scenarios and mentions resources for learning more about authorization rules.