Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Role-based access control

Index Role-based access control

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. [1]

34 relations: Access control list, AGDLP, Apache Fortress, Attribute-based access control, Bell–LaPadula model, CakePHP, Capability-based security, Classified information, Context-based access control, Discretionary access control, File system permissions, Grsecurity, Hierarchy, Identity driven networking, International Committee for Information Technology Standards, IT infrastructure, Lattice-based access control, Location-based authentication, Mandatory access control, Mathematical notation, National Institute of Standards and Technology, NIST RBAC model, Organisation-based access control, Partially ordered set, PERMIS, Risk-based authentication, Role hierarchy, Role-oriented programming, RSBAC, RTI International, Separation of duties, Set theory, SQL, XACML.

Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

New!!: Role-based access control and Access control list · See more »

AGDLP

AGDLP (an abbreviation of "account, global, domain local, permission") briefly summarizes Microsoft's recommendations for implementing role-based access controls (RBAC) using nested groups in a native-mode Active Directory (AD) domain: User and computer accounts are members of global groups that represent business roles, which are members of domain local groups that describe resource permissions or user rights assignments.

New!!: Role-based access control and AGDLP · See more »

Apache Fortress

Apache Fortress is an open source project of the Apache Software Foundation and a subproject of the Apache Directory.

New!!: Role-based access control and Apache Fortress · See more »

Attribute-based access control

Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.

New!!: Role-based access control and Attribute-based access control · See more »

Bell–LaPadula model

The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications.

New!!: Role-based access control and Bell–LaPadula model · See more »

CakePHP

CakePHP is an open-source web framework.

New!!: Role-based access control and CakePHP · See more »

Capability-based security

Capability-based security is a concept in the design of secure computing systems, one of the existing security models.

New!!: Role-based access control and Capability-based security · See more »

Classified information

Classified information is material that a government body deems to be sensitive information that must be protected.

New!!: Role-based access control and Classified information · See more »

Context-based access control

Context-based access control (CBAC) is a feature of firewall software, which intelligently filters TCP and UDP packets based on application layer protocol session information.

New!!: Role-based access control and Context-based access control · See more »

Discretionary access control

In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

New!!: Role-based access control and Discretionary access control · See more »

File system permissions

Most file systems have methods to assign permissions or access rights to specific users and groups of users.

New!!: Role-based access control and File system permissions · See more »

Grsecurity

grsecurity is a set of patches for the Linux kernel which emphasize security enhancements.

New!!: Role-based access control and Grsecurity · See more »

Hierarchy

A hierarchy (from the Greek hierarchia, "rule of a high priest", from hierarkhes, "leader of sacred rites") is an arrangement of items (objects, names, values, categories, etc.) in which the items are represented as being "above", "below", or "at the same level as" one another A hierarchy can link entities either directly or indirectly, and either vertically or diagonally.

New!!: Role-based access control and Hierarchy · See more »

Identity driven networking

Identity driven networking (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device.

New!!: Role-based access control and Identity driven networking · See more »

International Committee for Information Technology Standards

The InterNational Committee for Information Technology Standards (INCITS), (pronounced "insights"), is an ANSI-accredited standards development organization composed of Information technology developers.

New!!: Role-based access control and International Committee for Information Technology Standards · See more »

IT infrastructure

Information technology infrastructure is defined broadly as a set of information technology (IT) components that are the foundation of an IT service; typically physical components (computer and networking hardware and facilities), but also various software and network components.

New!!: Role-based access control and IT infrastructure · See more »

Lattice-based access control

In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of objects (such as resources, computers, and applications) and subjects (such as individuals, groups or organizations).

New!!: Role-based access control and Lattice-based access control · See more »

Location-based authentication

Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a distinct location.

New!!: Role-based access control and Location-based authentication · See more »

Mandatory access control

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

New!!: Role-based access control and Mandatory access control · See more »

Mathematical notation

Mathematical notation is a system of symbolic representations of mathematical objects and ideas.

New!!: Role-based access control and Mathematical notation · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Role-based access control and National Institute of Standards and Technology · See more »

NIST RBAC model

The NIST RBAC model is a standardized definition of role-based access control.

New!!: Role-based access control and NIST RBAC model · See more »

Organisation-based access control

In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003.

New!!: Role-based access control and Organisation-based access control · See more »

Partially ordered set

In mathematics, especially order theory, a partially ordered set (also poset) formalizes and generalizes the intuitive concept of an ordering, sequencing, or arrangement of the elements of a set.

New!!: Role-based access control and Partially ordered set · See more »

PERMIS

PERMIS (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy-based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model.

New!!: Role-based access control and PERMIS · See more »

Risk-based authentication

In Authentication, risk-based authentication is a non-static authentication system which takes into account the profile of the agent requesting access to the system to determine the risk profile associated with that transaction.

New!!: Role-based access control and Risk-based authentication · See more »

Role hierarchy

In role based access control, the role hierarchy defines an inheritance relationship among roles.

New!!: Role-based access control and Role hierarchy · See more »

Role-oriented programming

Role-oriented programming as a form of computer programming aims at expressing things in terms that are analogous to human conceptual understanding of the World.

New!!: Role-based access control and Role-oriented programming · See more »

RSBAC

RSBAC (Rule Set Based Access Control) is an open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a).

New!!: Role-based access control and RSBAC · See more »

RTI International

RTI International (formerly Research Triangle Institute) is a nonprofit organization headquartered in the Research Triangle Park in North Carolina that provides research and technical services.

New!!: Role-based access control and RTI International · See more »

Separation of duties

Separation of duties (SoD)(Also known as Segregation of Duties) is the concept of having more than one person required to complete a task.

New!!: Role-based access control and Separation of duties · See more »

Set theory

Set theory is a branch of mathematical logic that studies sets, which informally are collections of objects.

New!!: Role-based access control and Set theory · See more »

SQL

SQL (S-Q-L, "sequel"; Structured Query Language) is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).

New!!: Role-based access control and SQL · See more »

XACML

XACML stands for "eXtensible Access Control Markup Language".

New!!: Role-based access control and XACML · See more »

Redirects here:

RBAC, Rbac, Role based access control, Role based security, Role-Based Access Control, Role-based access control list, Role-based security.

References

[1] https://en.wikipedia.org/wiki/Role-based_access_control

OutgoingIncoming
Hey! We are on Facebook now! »