White Papers
Role-Based Security and its Implementation
7
privileges that are permitted to users in that role. With role-based access control, security
administration corresponds closely to an organization's structure.
Role-Based Access Control Architecture in OpenManage
Essentials
Figure 4. A simplified RBAC Model
Typical role-based access control architecture (Figure 4) has the following three components:
• Users: Create a user with credentials
• Roles: Assign the user to specific roles
• Permissions: Assign access control to the above role