blob: aa8494b2f9a48ca16dffc1c8396437786d846d24 [file] [log] [blame]
<p>Hi Shiro community,</p>
<p>The following article helps explain the differences in role-based vs resource-based access control and why Shiro's permission construct (which is based on resources) can be much better for an application:</p>
<p><a class="external-link" href="https://stormpath.com/blog/new-rbac-resource-based-access-control" rel="nofollow">The New RBAC: Resource-Based Access Control</a></p>