reading-notes

Class Eight Notes (401)

Access Control (ACL)

5 steps to RBAC1

RBAC Wiki2

  1. role-based assignment, where a subject can exercise a permission only if the subject has selected or been assigned a role;
  2. role authorization: a subject’s active role must be authorized for the subject;
  3. permission authorization: a subject can exercise a permission only if the permission is authorized for the subject’s active role. In combination of the two roles above, the user can exercise only permissions for which they are aurhorized

RBAC Tutorial3

  1. Policy does not have to change once a person leaves the organization or when a new employee signs on, they should be able to activate the rights by being in a role.
  2. Each person would revisiting least privilege, since the user in one role has access to a subset of the files rather than everything
  3. The user can switch roles to gain access to other resources.
  4. SELinux supports RBAC

Explain how RBAC might benefit a business.

Things I want to know more about

Back to main page

References

  1. https://www.csoonline.com/article/3060780/5-steps-to-simple-role-based-access-control.html 

  2. https://en.wikipedia.org/wiki/Role-based_access_control