5
5
[ ![ GitHub Code Style Action Status] ( https://img.shields.io/github/workflow/status/aurorawebsoftware/aauth/Check%20&%20fix%20styling?label=code%20style )] ( https://github.com/aurorawebsoftware/aauth/actions?query=workflow%3A"Check+%26+fix+styling"+branch%3Amain )
6
6
[ ![ Total Downloads] ( https://img.shields.io/packagist/dt/aurorawebsoftware/aauth.svg?style=flat-square )] ( https://packagist.org/packages/aurora/aauth )
7
7
8
- Hierarchical Rol-Permission Based ** Laravel Auth Package** with Limitless Hierarchical Level of Organizations
8
+ Organization Based (OrBAC) , Attibute Based (ABAC) , Rol-Permission (RBAC) Based Authentication Methods Combined ** Laravel Auth Package** with Limitless Hierarchical Level of Organizations and Limitless Attribute Conditions
9
9
10
10
# Features
11
11
12
12
- Organization Based Access Controllable (OrBAC) Eloquent Models
13
+ - Attribute Based Access Controllable (ABAC) Eloquent Models
13
14
- Role Based Access Control (RoBAC)
14
15
- Permissions Based Access Control
15
16
- Lean & Non-Complex Architecture
16
17
- PolyMorphic Relationships of Model & Organization Node
18
+ - DB Row Level Filtering for the Role with ABAC
17
19
- Built-in Blade Directives for permission control inside ** Blade** files
18
20
- Mysql, MariaDB, Postgres Support
19
21
- Community Driven and Open Source Forever
20
22
21
23
---
22
24
23
25
24
- [ <img src =" https://banners.beyondco.de/AAuth%20for%20Laravel.png?theme=light&packageManager=composer+require&packageName=aurorawebsoftware%2Faauth&pattern=jigsaw&style=style_1&description=Hierarchical+Role-Permission+Based+ Laravel+ Auth+ Package+with+Limitless+Hierarchical+Level+of+Organizations &md=1&showWatermark=0&fontSize=175px&images=shield-check&widths=auto " />] ( https://github.com/AuroraWebSoftware/AAuth )
26
+ [ <img src =" https://banners.beyondco.de/AAuth%20for%20Laravel.png?theme=light&packageManager=composer+require&packageName=aurorawebsoftware%2Faauth&pattern=jigsaw&style=style_1&description=OrBAC, ABAC, RBAC Combined Laravel Auth Package&md=1&showWatermark=0&fontSize=175px&images=shield-check&widths=auto " />] ( https://github.com/AuroraWebSoftware/AAuth )
25
27
26
28
# Installation
27
29
@@ -88,7 +90,7 @@ return [
88
90
];
89
91
```
90
92
91
- # Main Philosophy
93
+ # Main Philosophy of AAuth OrBAC
92
94
93
95
In computer system security, there are several approaches to restrict system access to authorized users.
94
96
@@ -139,6 +141,12 @@ Principal dynamically *without writing one line of code?*
139
141
- Canada
140
142
- .....
141
143
144
+ # Main Philosophy of AAuth ABAC
145
+
146
+ // todo coming soon ....
147
+
148
+
149
+ ---
142
150
** AAuth may be your first class assistant package.**
143
151
144
152
---
@@ -187,6 +195,9 @@ file's permission['system'] array.
187
195
an Organization Role.
188
196
Organization Permissions should be added inside ` aauth.php ` config file's permission[ 'organization'] array.
189
197
198
+ ## ABAC
199
+ // todo coming soon
200
+
190
201
## Role
191
202
192
203
Roles are assigned to users. Each User can have multiple roles.
@@ -226,6 +237,10 @@ be an organization node and can be access controllable.
226
237
It means that; Only Authorized User Role can be access the relating model, or in other words, Each role only can access
227
238
the models which is on Authenticated Sub-Organization Tree of User's Role.
228
239
240
+ ### Model - ABAC rules
241
+ // todo coming soon
242
+
243
+
229
244
# Usage
230
245
231
246
Before using this, please make sure that you published the config files.
@@ -283,10 +298,10 @@ $organizationService->createOrganizationScope($data);
283
298
```
284
299
285
300
### Updating an Organization Scope
286
- the contributors' space
301
+ // todo help wanted
287
302
288
303
### Deleting an Organization Scope
289
- the contributors' space
304
+ // todo help wanted
290
305
291
306
292
307
### Creating an Organization Node without Model Relationship
@@ -304,10 +319,10 @@ $organizationService->createOrganizationNode($data);
304
319
```
305
320
306
321
### Updating an Organization Node
307
- the contributors' space
322
+ // todo help wanted
308
323
309
324
### Deleting an Organization Node
310
- the contributors' space
325
+ // todo help wanted
311
326
312
327
## Role Permission Service
313
328
@@ -341,10 +356,10 @@ $createdRole = $rolePermissionService->createRole($data);
341
356
```
342
357
343
358
### Updating a Role
344
- ...
359
+ // todo help wanted
345
360
346
361
### Deleting a Role
347
- ....
362
+ // todo help wanted
348
363
349
364
### Attaching a Role to a User
350
365
``` php
@@ -389,7 +404,7 @@ $rolePermissionService->attachOrganizationRoleToUser($organizationNode->id, $cre
389
404
```
390
405
391
406
### Creating a System Role and Attaching to a User
392
- ....
407
+ // todo help wanted
393
408
394
409
395
410
## Using AAuth Interface and Trait with Eloquent Models
@@ -411,7 +426,11 @@ class ExampleModel extends Model implements AAuthOrganizationNodeInterface
411
426
}
412
427
```
413
428
429
+ ## Using ABAC Interface and Trait with Eloquent Models
430
+ // todo
431
+
414
432
## AAuth Service and Facade Methods
433
+ // todo
415
434
416
435
### Current Roles All Permissions
417
436
current user's selected roles permissions with ** AAuth Facade**
@@ -444,8 +463,7 @@ $organizationNodes = AAuth::organizationNodes();
444
463
```
445
464
446
465
### Get one specified organization node
447
- .....
448
-
466
+ // todo help wanted
449
467
450
468
### Descendant nodes can be checked
451
469
with this method you can check is a organization node is descendant of another organization node.
@@ -469,16 +487,22 @@ $exampleModel = ExampleModel::find(1);
469
487
$relatedOrganizationModel = $exampleModel->relatedAAuthOrganizationNode()
470
488
```
471
489
472
- ## Getting allowed Organization Nodes Only.
490
+ ## Getting authorized Models only. (OrBAC)
473
491
474
492
after adding ` AAuthOrganizationNode ` trait to your model, you are adding a global scope which filters the permitted data.
475
493
476
- Thus you can simply use any eloquent model method without adding anything
494
+ Thus, you can simply use any eloquent model method without adding anything
477
495
478
496
``` php
479
497
ExampleModel::all();
480
498
```
481
499
500
+ ## Creating Role - ABAC Rules
501
+ // todo
502
+
503
+ ## Getting authorized Models only. (ABAC)
504
+ // todo
505
+
482
506
## Getting All Model Collection without any access control
483
507
``` php
484
508
ExampleModel::withoutGlobalScopes()->all()
0 commit comments