RBAC

Overview#

RBAC is a Access Control Models where the central notion is that Permissions are associated with Roles, and users are assigned to appropriate Roles.

The abstraction of removing Permissions from the user greatly simplifies management of permissions.

Roles are created for the various job functions in an organization and users are assigned roles based on their responsibilities and qualifications. Users can be easily be assigned from one role to another. Roles can be granted new permissions as new Protected Resource are incorporated, and permissions can be revoked from roles as needed.

RBAC vs ABAC#

The silly discussion of RBAC vs ABAC.

More Details on RBAC #

"One of the most challenging problems in managing large networks is the complexity of security administration. Role Based Access Control (also called role based security), as formalized in 1992 by David Ferraiolo and Rick Kuhn, has become the predominant model for advanced access control because it reduces the complexity and cost of security administration in large networked applications. Most information technology vendors have incorporated RBAC into their product line, and the technology is finding applications in areas ranging from health care to defense, in addition to the mainstream commerce systems for which it was designed."[1]

It should be noted, that although NIST has done a lot of work on RBAC, the NIST RBAC standard does not work well for all implementations.

Role Based Access Control certainly should be part of your Strategic Directions, but usually, a tactical solution is what is required in the near term.

When discussing an RBAC model, the following conventions are useful:

Some items to keep in mind:

Component Summary.#

There are Others #

There are other Access Control Models that maybe of interest.

Defining Roles#

There is a lot of discussion on Role Based Access Controls as to what it is and how to Defining Roles. Most of the discussion appears by vendors, either suppliers of IdM Products or supplies of IdM services. These discussions although maybe well intended, are attempts to make IdM sexy and exciting.

RBAC How are roles different from groups?#

RBAC How are roles different from groups?!! More Information There might be more information for this subject on one of the following:
[#1] - http://csrc.nist.gov/rbac/