Definition - What does
Role-based security is a principle by which developers create systems that limit access or restrict operations according to a user’s constructed role within a system. This is also often called role-based access control, since many businesses and organizations use this principle to ensure that unauthorized users do not gain access to privileged information within an IT architecture.
There are many ways to develop a role-based security system. All of them start with the definition of various roles and what users assigned to those roles can and can’t do or see. The resulting levels of functionality must be coded into the system using specific parameters.
Object-oriented programming often involves treating a role as an object relative to certain code modules or functions. In a Microsoft programming setting, a developer might use a PrincipalPermission object in .Net to examine an object containing a role designation and to perform security checks. In other cases, information about an object can be passed to a method for a security check.
Any role-based security system depends on the code's ability to correctly and thoroughly control a given user by his or her assigned role and therefore guard against unauthorized use of proprietary identifiers of a specific role. Alternative models include mandatory access control, where certain specifics are coded into an operating system, and discretionary access control, where some elements of security may be more flexible. For example, a more privileged user may be able to "pass" access to another user in a simple discretionary event or process.
Role-Based Access Control (RBAC)
.NET Framework (.NET)
VoIP - Backdoor to Your Network?
- VoIP is well known for its cost effectiveness, but security should be considered before you embark on a VoIP implementation.
The 7 Basic Principles of IT Security
- IT professionals use best practices to keep corporate, government and other organizations' systems safe.
Security Certifications from CompTIA
- Carol Balkcom, director of product management at CompTIA, tells us about CompTIA's security certifications and how they can help IT pros run a tighter ship.
Related White Papers
Role-Based Access Control
Recommended For You
5 Things to Look for in CISPA's Replacement
Connect with us
Techopedia on Linkedin
Follow us on LinkedIn
Techopedia on Twitter
Sign up for Techopedia's Free Newsletter!
History of Tech
Who To Follow
Buzzwords and Jargon
World Wide Web