role based access control
play

Role-Based Access Control Corban Rivera CS 6204, Spring 2005 1 - PowerPoint PPT Presentation

Role-Based Access Control Corban Rivera CS 6204, Spring 2005 1 Trusted Computer System Evaluation Criteria (TCSEC) Background MAC Mandatory Access Control Firm security levels DAC Discretionary Access Control Access


  1. Role-Based Access Control Corban Rivera CS 6204, Spring 2005 1

  2. Trusted Computer System Evaluation Criteria (TCSEC) Background ♦ MAC – Mandatory Access Control – Firm security levels ♦ DAC – Discretionary Access Control – Access can be delegated CS 6204, Spring 2005 2

  3. Role Based Access Control ♦ Access is role (job) specific – Roles are intrinsically part of organizations CS 6204, Spring 2005 3

  4. RBAC Supports ♦ Simplified Administration – Predefined roles change slowly ♦ Least Privilege – Roles are given least amount of privilege to complete assigned tasks ♦ Separation of Duties – Mutually exclusive roles ♦ Data Abstraction – Abstract privilages CS 6204, Spring 2005 4

  5. Relationship types in RBAC ♦ between roles – inheritance ♦ Between users and roles ♦ Between roles and permissions CS 6204, Spring 2005 5

  6. Additional Features ♦ Role membership cardinality constraints – Enforce a maximum number of members in a role ♦ Prerequisite roles – Role access granted because of membership in prerequisite roles ♦ Administrative RBAC – RBAC can be used to give privileges to RBAC administrators CS 6204, Spring 2005 6

Recommend


More recommend