Libraries tagged by role-based access
commpeak/phprbac
46 Downloads
PHP-RBAC is the de-facto authorization library for PHP. It provides developers with NIST Level 2 Standard Role Based Access Control and more, in the fastest implementation yet.
beastbytes/yii-rbam
0 Downloads
Role Based Access Manager for Yii3
bbrody/phprbac
259 Downloads
PHP-RBAC is the de-facto authorization library for PHP. It provides developers with NIST Level 2 Standard Role Based Access Control and more, in the fastest implementation yet.
aries/laravel-rbac
74 Downloads
role based access control for laravel framework
antaresproject/component-acl
20 Downloads
ACL is a lightweight role-based permissions module for Antares. It is designed to manage user access to resources located in different sections of the application. It sets up permissions based on module rules. It provides NIST Level 2 Hierarchical Role Based Access Control (RBAC). It also provides an interface for administator to manage user roles (ACL configuration).
aneeq/laravelrbac
52 Downloads
Role Based Access Control For Laravel Projects
amonray/laravel-rbac
48 Downloads
Role based access control for Laravel 5+
alexya-framework/roles
19 Downloads
Alexya's Role Based Access System utilities
abmemon/sentinelrbac
2 Downloads
SentinelRBAC is a powerful and flexible Role-Based Access Control (RBAC) package for Laravel. Built for modern Laravel applications, it provides a clean and scalable way to manage roles, permissions, and access gates — with zero friction.
rockbuzz/lara-rbac
232 Downloads
Role Based Access Control per resource
pmc/acl
1814 Downloads
Role based access control list which can make use of class hierarchy for access checks.
goez/acl
9 Downloads
Simple role-based access control for Laravel
dec/users
474 Downloads
Simple role based access control
ayaalkaplin/yii2-rbac
5 Downloads
Role Based Access Controll for yii2
dualink/permisology-system
58 Downloads
A comprehensive Filament plugin for managing role-based permissions and access control. It includes features like blacklists and public access lists for endpoints, and the ability to restrict access to users or roles based on IP and DNS.