Role-based access control

From WikiMD's Wellness Encyclopedia

Role-based access control

Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an organization. RBAC is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC).

Overview[edit | edit source]

RBAC is a policy-neutral access control mechanism defined around roles and privileges. The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments. In large-scale systems, RBAC can be used to reduce the complexity and cost of security administration.

Components[edit | edit source]

RBAC includes several key components:

  • Roles: A role is a job function or title which defines an authority level.
  • Permissions: Permissions are the approval to perform certain operations.
  • Users: Users are individuals who have access to the system.
  • Sessions: A session is a mapping between a user and an activated subset of roles that the user is assigned to.

Role Hierarchies[edit | edit source]

Role hierarchies are a natural way of organizing roles to reflect the lines of authority and responsibility in an organization. Higher-level roles inherit the permissions of lower-level roles.

Constraints[edit | edit source]

Constraints are a powerful mechanism for laying out higher-level organizational policy. They can be used to enforce separation of duties, which ensures that no single individual has control over all phases of a transaction.

Benefits[edit | edit source]

RBAC offers several benefits:

  • Reduced administrative work: By assigning roles to users, rather than individual permissions, the administrative overhead is significantly reduced.
  • Improved security: By enforcing the principle of least privilege, users are only given access to what they need to perform their job.
  • Scalability: RBAC is highly scalable and can be used in large organizations with thousands of users.

Applications[edit | edit source]

RBAC is widely used in various applications including:

Related Concepts[edit | edit source]

See Also[edit | edit source]

References[edit | edit source]

External Links[edit | edit source]

Template:Compu-security-stub

WikiMD
Navigation: Wellness - Encyclopedia - Health topics - Disease Index‏‎ - Drugs - World Directory - Gray's Anatomy - Keto diet - Recipes

Search WikiMD

Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD

WikiMD's Wellness Encyclopedia

Let Food Be Thy Medicine
Medicine Thy Food - Hippocrates

Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.

Contributors: Prab R. Tumpati, MD