Latest posts

adminstration

Access 5: Juggling Keys in the Rules DB

Access Control is powerful. System-central storage is a bit iffy. How do we stop people from abusive tapping?

>> Continue reading <<

adminstration

Access 4: ARPA2 Access Control for Mail

We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!

>> Continue reading <<

adminstration

Access 3: ARPA2 Access Control and Groups for Admins

Let's say you own a domain name, and have software that uses ARPA2 Access Control. How, then, can you grant or revoke access?

>> Continue reading <<

Philosophy

Think Globally, Act Locally

Christmas is a time for reflection, certainly in 2020. What is the World doing, what is our role in it, and can we improve in the next year?

>> Continue reading <<

architecture

Access 2: Shaped like a Matrix

There are two ways of looking at Access Control. One is easy, with a direct relation to the resources being managed. The other is advanced, but like putty in the hands of administrators; moreover, it is highly efficient. Efficiency matters; it allows us to enforce access control everywhere, with no experienced discomfort. We derive the efficient model from the one that is easy to use.

>> Continue reading <<