Security & Access Control
RBAC System
Game Framework uses Role-Based Access Control (RBAC) for fine-grained access management.
Overview
RBAC provides:
- 4 default roles (Owner, Developer, Tester, Viewer)
- 40+ permissions across 8 categories
- Role inheritance for simplified management
- Custom roles (Enterprise)
Permission Model
Permission Categories
- Packages - Create, edit, delete packages
- Versions - Publish and manage versions
- Artifacts - Upload and download files
- Webhooks - Configure integrations
- API Keys - Manage authentication
- Downloads - Track usage
- Workspace - Workspace settings
- Members - Team management
Permission Format
category.actionExamples:
packages.createversions.publishartifacts.upload
How It Works
graph LR
User[User] --> Role[Role]
Role --> Permissions[Permissions]
Permissions --> Resource[Resource Access]When a user attempts an action:
- System checks user's role
- Retrieves role permissions
- Verifies permission for action
- Allows or denies request
Checking Permissions
# Get your permissions
curl https://registry.yourcompany.com/v1/me/permissions \
-H "Authorization: Bearer $TOKEN"Best Practices
- Least Privilege - Grant minimum necessary permissions
- Regular Reviews - Audit roles quarterly
- Document Assignments - Track why users have roles
- Use Appropriate Roles - Don't make everyone Owner
Next Steps
- Roles & Permissions - Detailed role matrix
- API Keys - Scoped API keys