<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>RBAC on Peter.H's Full-Stack GAME</title><link>https://peter-notes.com/tags/rbac/</link><description>Recent content in RBAC on Peter.H's Full-Stack GAME</description><image><title>Peter.H's Full-Stack GAME</title><url>https://peter-notes.com/images/og-image.jpg</url><link>https://peter-notes.com/images/og-image.jpg</link></image><generator>Hugo</generator><language>zh-tw</language><lastBuildDate>Tue, 20 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://peter-notes.com/tags/rbac/index.xml" rel="self" type="application/rss+xml"/><item><title>當授權資料不可信時，我選擇讓系統安靜地退後一步</title><link>https://peter-notes.com/posts/authorization-degraded-mode-design/</link><pubDate>Tue, 20 Jan 2026 00:00:00 +0000</pubDate><guid>https://peter-notes.com/posts/authorization-degraded-mode-design/</guid><description>當 RBAC（Role-Based Access Control）的 Link Table 資料不正確時，系統該全站拒絕、繼續相信 cache、還是進入 degraded mode？這篇文章分享我的設計決策與實作方式</description></item></channel></rss>