Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
200K+ Authorization Checks per sec with Graph Based RBAC and Zero DB Hits
Aug 30, 2025
40 views
Written by Prashant Basnet
👋 Welcome, You’ve Landed on My Signature Page.
I’m a Software Development Engineer passionate about building scalable systems and solving problems.
Beyond engineering, I enjoy sharing ideas and documenting lessons so others can learn and build on them.This space is my digital notebook, a place where I reflect on what I’m learning and creating.
The Situation & Challenge:
At Blueflite, drone operations platform serves multiple organizations with straightforward roles:
Each role spans multiple functional areas — for example:
but access isn’t flat. The system naturally has nested structure:
1. Hierarchical permissions:
Granting Fleet access should imply submodules like Vehicles, but not bleed into unrelated siblings.
2. Multi-Tenant Scoping
2. The Task: Flexible Authorization Without Role Explosion
3. The Action: Permission Graphs
Instead of treating permissions as flat strings, we modeled them as a directed graph.
A directed graph mirrors the real domain:
This approach gives us:
How the System Works?
\
When the system starts, it plots the entire permission graph from the configuration.
For each permission node, it calculates all reachable nodes by traversing the graph.
We run a transitive closure algorithm like Floyd–Warshall or equivalent to produce a compact reachability map.
Runtime flow:
4. Results & Impact
The graph-based approach delivered measurable improvements across all key metrics:
The system naturally handles complex scenarios:
This architecture proves that enterprise grade authorization doesn't require enterprise-grade infrastructure just thoughtful engineering.
#rbac #engineering #blueflite #authroziation