The fundament of our security is a customizable role hierarchy. One or multiple roles can be applied to a user. Every role itself is linked to different permissions which allow to view, edit or delete resources like geocaches, logs or users. If no permission is present it defaults to disallowing the action.
Role hierarchy
https://app.conceptboard.com/board/9qra-r8bs-bpy2-cuf2-0ikx
...
This diagram must be read bottom to top. Every role inherits roles above them. Example: ROLE_SOCIAL_HEAD contains ROLE_SOCIAL, ROLE_TEAM and ROLE_USER. Every logged in user has ROLE_USER.