Tools•checker
Retool for Internal Tools & Admin Panels
Validates and simulates RBAC permissions for internal tools based on user roles and actions
Try the tool
client runnerPermission evaluation result
Run the tool to see output.
Examples
Admin write access
{
"user_role": "admin",
"action": "write",
"resource": "dashboard",
"permission_matrix": "{ \"admin\": { \"dashboard\": [\"read\", \"write\"] } }"
}Expected output
{ "allowed": true, "reason": "Admin has write permissions for dashboard" }Viewer delete attempt
{
"user_role": "viewer",
"action": "delete",
"resource": "settings",
"permission_matrix": "{ \"admin\": { \"settings\": [\"read\", \"write\"] }, \"viewer\": { \"settings\": [\"read\"] } }"
}Expected output
{ "allowed": false, "reason": "Viewer lacks delete permissions for settings" }How it works
This tool evaluates RBAC permissions by matching user roles to defined permission matrices. Developers input their role-based access control structure and test specific action/resource combinations to verify authorization rules before implementation.