Wednesday, 6 August 2014

Database Protection | access control | ROLE BASED ACCESS CONTROL


1. Role based access control (RBAC) emerged rapidly in the 1990s as a proven technology for managing and enforcing security in large scale enterprise wide systems.

2 Permissions are associated with roles and users are assigned to appropriate roles.Roles can be created using the CREATE ROLE and DESTROY  ROLE command.

3. The GRANT and REVOKE commands discussed under DAC can then be used to assign and revoke privileges from roles.

4. RBAC ensures that only authorized user are given access to certain data and resources.

5. Roles models have several desirable features such as flexibility,policy neutrality ,better support for security management and administration and others aspects that make them attractive candidates for developing secure wed based applications.

6. RBAC model provides a natural mechanism for addressing the security issues related to the execution of tasks and workflows.

7. Easier deployment over the internet has been another reason for the success of RBAC models.


Post a Comment