preview

Role Based Access Control (RBAC)

Decent Essays

Role Based Access Control (RBAC)
Role based access control is an ideology through which access to systems is restricted based on authority given. It is used by organizations with a relatively large number of employees ranging from five hundred to one thousand and above (Sieunarine & University of Oxford, 2011). This is implemented through the mandatory access control or through the discretionary access control. These are the only two ways through which role based access control can be implemented.
Roles are normally created for the varying business roles or functions. Performance of certain activities is limited to certain job roles or functions. Staff members given the task to undertake such activities are given user accounts unique to them to undertake these roles (Ferraiolo, Kuhn & Chandramouli, 2003). This is normally under the discretion of the immediate supervisor through dialogue with the overall supervisor of a particular division or department.
RBAC is among the simplest and flexible forms of access control. MAC is normally associated or linked to matters relating to the military and or national security. It conforms or is frequently used in situations whereby there is one major form of authority leading the rest of the pack. It is based on the premise of one directional flow in a trellis. MAC focuses on the need of restricting others to certain forms of information that are considered sensitive and one would need clearance to access the same. Clearance denotes the

Get Access