Toolschecker

Retool for Internal Tools & Admin Panels

Validates and simulates RBAC permissions for internal tools based on user roles and actions

Try the tool

client runner

Permission evaluation result

Run the tool to see output.

Examples

Admin write access

{
  "user_role": "admin",
  "action": "write",
  "resource": "dashboard",
  "permission_matrix": "{ \"admin\": { \"dashboard\": [\"read\", \"write\"] } }"
}

Expected output

{ "allowed": true, "reason": "Admin has write permissions for dashboard" }

Viewer delete attempt

{
  "user_role": "viewer",
  "action": "delete",
  "resource": "settings",
  "permission_matrix": "{ \"admin\": { \"settings\": [\"read\", \"write\"] }, \"viewer\": { \"settings\": [\"read\"] } }"
}

Expected output

{ "allowed": false, "reason": "Viewer lacks delete permissions for settings" }

How it works

This tool evaluates RBAC permissions by matching user roles to defined permission matrices. Developers input their role-based access control structure and test specific action/resource combinations to verify authorization rules before implementation.

Related tools