Your location:Home>科学计算 数据统计分析>数据分析

Foxpass:Role-Based Access Control (RBAC): Why is it Important?

Role-Based Access Control, or RBAC for short, is resource access-restricted based upon the user’s job title or role within an organization.

For example: you wouldn’t want John in accounting to have the same access privileges to your company’s infrastructure that Susie the engineer does.

RBAC makes it incredibly easy for a manager to designate what employees are granted permissions to perform certain operations on both a broad and finely-tuned, granular level.

The diagram below is a basic overview of RBAC:

RBAC Pros

Why Use RBAC?

2 Examples of RBAC

 

Additional knowledge on Role-Based Access Control

3 Primary Rules for RBAC:

RBAC Conventions

Designation

Term

Meaning

S

Subject

A person or automated agent

R

Role

What the person does

P

Permission

An approval mode of access to a resource

SE

Session

Mapping involving S, E, and/or P

SA

Subject Assignment

 

PA

Permission Assignment

 

RH

Role Hierarchy

 

 

Foxpass Offers RBAC Without the Hassle

Foxpass offers easy Role-Based Access Control at the click of a button using our Host Groups feature which restrict user or group SSH access to subsets of your hosts.

Host Groups can filter hosts by hostname, AWS Connection Name, AWS VPC ID, AWS Subnet ID, or AWS Tag:

 

 

Simplify your network security using RBAC and have your infrastructure secured in minutes, not weeks or months.

 

北京哲想软件有限公司