Introduction to RBAC -
Role based access control system is a method of restricting access to 'some sources or applications or some features of applications' based on the roles of users of organization.
Here, restrictions can be by means of multiple permissions, those are created by administrator to restrict access, and these permissions collectively represents a role, which will be assigned to user.
And if we go slight deeper in RBAC, it basically contains 3 features.
1) Authentication - It confirms the user's identity. Usually it is done via user accounts and passwords or credentials.
2) Authorization - It defines what user can do and cannot do in an application. Ex. ‘Modifying order’ is allowed but ‘creating new order’ is not allowed.
3) Auditing of user actions on applications. - It keeps track of user's actions on applications, as well as who has granted which access to which users?
This was very basic top view picture of RBAC system.
Basic Structure of RBAC system can contain following components:
Users, Roles, Permissions or restrictions, resources.
- Permissions or restrictions – permissions represents an access to
application’s resource.
- Role – It contains collection of permissions
- User – Single or multiple roles assigned to user, so eventually user
contains permissions via means of role.
In addition to this, you can also have collection of users – called – groups, and role can be assigned to groups, if you want to support complex scenarios.
So, This was very basic information about RBAC structure.