{"id":25967,"date":"2024-03-16T05:57:47","date_gmt":"2024-03-16T05:57:47","guid":{"rendered":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/"},"modified":"2024-03-22T07:27:04","modified_gmt":"2024-03-22T07:27:04","slug":"what-are-the-different-ways-of-authorization-in-the-shiro-framework","status":"publish","type":"post","link":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/","title":{"rendered":"What are the different ways of authorization in the Shiro framework?"},"content":{"rendered":"<p>The Shiro framework offers several options for authorization.<\/p>\n<ol>\n<li>Role-Based Authorization is a method of controlling a user&#8217;s access to resources by assigning them specific roles. For example, by defining an &#8220;admin&#8221; role, only users with that role can perform certain actions.<\/li>\n<li>Permission-Based Authorization involves assigning specific permissions to users in order to control their access to resources. For example, a &#8220;write&#8221; permission can be defined so that only users with this permission can perform writing operations.<\/li>\n<li>Custom Authorization: The Shiro framework allows users to authorize in a customized way. It enables users to implement their own authorization logic to determine whether a user has the permission to perform a specific operation.<\/li>\n<li>Wildcard Authorization: The Shiro framework supports authorization using wildcards, which can be used to match multiple roles or permissions. For example, using &#8220;role:*&#8221; allows users with any role to have permission.<\/li>\n<li>Resource-Based Authorization is supported by the Shiro framework, also known as ACL (Access Control List) authorization. By assigning access permissions to each resource, users can be precisely controlled in their access to different resources.<\/li>\n<\/ol>\n<p>It is worth noting that the above authorization methods can be used in combination to meet different authorization needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Shiro framework offers several options for authorization. Role-Based Authorization is a method of controlling a user&#8217;s access to resources by assigning them specific roles. For example, by defining an &#8220;admin&#8221; role, only users with that role can perform certain actions. Permission-Based Authorization involves assigning specific permissions to users in order to control their access [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-25967","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.5 (Yoast SEO v21.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the different ways of authorization in the Shiro framework? - Blog - Silicon Cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the different ways of authorization in the Shiro framework?\" \/>\n<meta property=\"og:description\" content=\"The Shiro framework offers several options for authorization. Role-Based Authorization is a method of controlling a user&#8217;s access to resources by assigning them specific roles. For example, by defining an &#8220;admin&#8221; role, only users with that role can perform certain actions. Permission-Based Authorization involves assigning specific permissions to users in order to control their access [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog - Silicon Cloud\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SiliCloudGlobal\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-16T05:57:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T07:27:04+00:00\" \/>\n<meta name=\"author\" content=\"Ava Mitchell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SiliCloudGlobal\" \/>\n<meta name=\"twitter:site\" content=\"@SiliCloudGlobal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ava Mitchell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\"},\"author\":{\"name\":\"Ava Mitchell\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64\"},\"headline\":\"What are the different ways of authorization in the Shiro framework?\",\"datePublished\":\"2024-03-16T05:57:47+00:00\",\"dateModified\":\"2024-03-22T07:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\"},\"wordCount\":207,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\",\"url\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\",\"name\":\"What are the different ways of authorization in the Shiro framework? - Blog - Silicon Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#website\"},\"datePublished\":\"2024-03-16T05:57:47+00:00\",\"dateModified\":\"2024-03-22T07:27:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.silicloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the different ways of authorization in the Shiro framework?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#website\",\"url\":\"https:\/\/www.silicloud.com\/blog\/\",\"name\":\"Silicon Cloud Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#organization\",\"name\":\"Silicon Cloud Blog\",\"url\":\"https:\/\/www.silicloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png\",\"contentUrl\":\"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png\",\"width\":1024,\"height\":1024,\"caption\":\"Silicon Cloud Blog\"},\"image\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SiliCloudGlobal\/\",\"https:\/\/twitter.com\/SiliCloudGlobal\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64\",\"name\":\"Ava Mitchell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g\",\"caption\":\"Ava Mitchell\"},\"url\":\"https:\/\/www.silicloud.com\/blog\/author\/avamitchell\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What are the different ways of authorization in the Shiro framework? - Blog - Silicon Cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/","og_locale":"en_US","og_type":"article","og_title":"What are the different ways of authorization in the Shiro framework?","og_description":"The Shiro framework offers several options for authorization. Role-Based Authorization is a method of controlling a user&#8217;s access to resources by assigning them specific roles. For example, by defining an &#8220;admin&#8221; role, only users with that role can perform certain actions. Permission-Based Authorization involves assigning specific permissions to users in order to control their access [&hellip;]","og_url":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/","og_site_name":"Blog - Silicon Cloud","article_publisher":"https:\/\/www.facebook.com\/SiliCloudGlobal\/","article_published_time":"2024-03-16T05:57:47+00:00","article_modified_time":"2024-03-22T07:27:04+00:00","author":"Ava Mitchell","twitter_card":"summary_large_image","twitter_creator":"@SiliCloudGlobal","twitter_site":"@SiliCloudGlobal","twitter_misc":{"Written by":"Ava Mitchell","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/#article","isPartOf":{"@id":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/"},"author":{"name":"Ava Mitchell","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64"},"headline":"What are the different ways of authorization in the Shiro framework?","datePublished":"2024-03-16T05:57:47+00:00","dateModified":"2024-03-22T07:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/"},"wordCount":207,"commentCount":0,"publisher":{"@id":"https:\/\/www.silicloud.com\/blog\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/","url":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/","name":"What are the different ways of authorization in the Shiro framework? - Blog - Silicon Cloud","isPartOf":{"@id":"https:\/\/www.silicloud.com\/blog\/#website"},"datePublished":"2024-03-16T05:57:47+00:00","dateModified":"2024-03-22T07:27:04+00:00","breadcrumb":{"@id":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.silicloud.com\/blog\/what-are-the-different-ways-of-authorization-in-the-shiro-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.silicloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What are the different ways of authorization in the Shiro framework?"}]},{"@type":"WebSite","@id":"https:\/\/www.silicloud.com\/blog\/#website","url":"https:\/\/www.silicloud.com\/blog\/","name":"Silicon Cloud Blog","description":"","publisher":{"@id":"https:\/\/www.silicloud.com\/blog\/#organization"},"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.silicloud.com\/blog\/#organization","name":"Silicon Cloud Blog","url":"https:\/\/www.silicloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png","contentUrl":"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png","width":1024,"height":1024,"caption":"Silicon Cloud Blog"},"image":{"@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SiliCloudGlobal\/","https:\/\/twitter.com\/SiliCloudGlobal"]},{"@type":"Person","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64","name":"Ava Mitchell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g","caption":"Ava Mitchell"},"url":"https:\/\/www.silicloud.com\/blog\/author\/avamitchell\/"}]}},"_links":{"self":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts\/25967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/comments?post=25967"}],"version-history":[{"count":1,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts\/25967\/revisions"}],"predecessor-version":[{"id":60108,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts\/25967\/revisions\/60108"}],"wp:attachment":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/media?parent=25967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/categories?post=25967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/tags?post=25967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}