role based access control
play

Role-Based Access Control Corban Rivera CS 6204, Spring 2005 1 - PowerPoint PPT Presentation

Role-Based Access Control Corban Rivera CS 6204, Spring 2005 1 Trusted Computer System Evaluation Criteria (TCSEC) Background MAC Mandatory Access Control Firm security levels DAC Discretionary Access Control Access


  1. Role-Based Access Control Corban Rivera CS 6204, Spring 2005 1

  2. Trusted Computer System Evaluation Criteria (TCSEC) Background ♦ MAC – Mandatory Access Control – Firm security levels ♦ DAC – Discretionary Access Control – Access can be delegated CS 6204, Spring 2005 2

  3. Role Based Access Control ♦ Access is role (job) specific – Roles are intrinsically part of organizations CS 6204, Spring 2005 3

  4. RBAC Supports ♦ Simplified Administration – Predefined roles change slowly ♦ Least Privilege – Roles are given least amount of privilege to complete assigned tasks ♦ Separation of Duties – Mutually exclusive roles ♦ Data Abstraction – Abstract privilages CS 6204, Spring 2005 4

  5. Relationship types in RBAC ♦ between roles – inheritance ♦ Between users and roles ♦ Between roles and permissions CS 6204, Spring 2005 5

  6. Additional Features ♦ Role membership cardinality constraints – Enforce a maximum number of members in a role ♦ Prerequisite roles – Role access granted because of membership in prerequisite roles ♦ Administrative RBAC – RBAC can be used to give privileges to RBAC administrators CS 6204, Spring 2005 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend