System News
 1 2 3 4 5 6 next
Articles for the keywords: RBAC
19 Apr 2017 Role-based Access Control: Keeping Your Business Out of Harm's Way [62625]
Centrify, April 19th 2017

When our baby first started crawling, we installed gates in all the doorways. This kept her in safe, baby proofed areas. We didn't have to worry about her accidentally wandering into a room and getting into something that could harm her. It also allowed us to keep some things 'nice' that a toddler would normally want to 'play' with.

But, what does this have to do with role-based access control (RBAC)? Well everything. As she grows and gains more skills, we adjust her access to the house. It might be low tech, but it is real life role-based access control.
(Get More Information . .) open to premium members only

05 Nov 2014 Enterprise Role Definition: [39244]
Best Practices and Approach

Eric Renaud writes, "Infosys Limited (NYSE:INFY) is a global leader in technology, consulting and services and an Oracle (Diamond) Partner that has graciously agreed to present on best practices garnered from experience working on Large Enterprise IDM deployments in a four part series hosted here in the Identity Management Blog.

Role Engineering

Today a number of organizations are considering or are in the process of moving to a Role Based Access Control (RBAC) model. Role Engineering is the process by which an organization develops, defines, enforces, and maintains role-based access control. RBAC is often seen as a way to improve security controls for access and authorization, as well as to enforce access policies such as segregation of duties (SoD) to meet regulatory compliance. It establishes effective controls and insight into 'Who has access to What'.

RBAC Basic

The concept of roles is defined in the ANSI RBAC standard that was first proposed by the National Institute for Standards and Technology (NIST). The model for RBAC illustrates the mapping between users, roles, and privileges (permissions) in base RBAC. Privileges are collections of system-specific operations on objects that can be mapped to roles..."
(Get More Information . .) open to premium members only

13 Jan 2014 Remote Access Security: What is ABAC and Can It Protect My Network? [34540]
SearchNetworking, January 13th, 2014

"Internal corporate networks are a lot like bank vaults. The information contained within them can be highly valuable and a prime target for criminals. Many modern-day bank vaults require two separate keys possessed by two different individuals in order to be opened. The idea here is that if one of those individuals is compromised or if one of the keys is stolen, thieves still won't be able to get their hands on your valuables.

When it comes to remote access security best practices, the same approach is being taken at corporate networks. For a long time, role-based access control (RBAC) has been used to grant remote access to data stored on corporate servers. User roles, defined in a specific database, dictate what an employee can access remotely. This approach helps to reduce the risk of cyber-breaches when mobile endpoints or unsecured networks are used by employees to connect with corporate servers..."
(Get More Information . .) open to premium members only

22 Apr 2013 'Function Security and Role-Based Access Control (RBAC) in Oracle E-Business Suite' [30625]
New Oracle Whitepaper on the Latest Work in RBAC

The new white paper "Function Security and Role-Based Access Control (RBAC) in Oracle E-Business Suite (Note 1537100.1)" (registration and log-in required) draws some praise from Chris Warticki, who explains that it illustrates two main ways to implement security in Oracle E-Business Suite: “traditional” Oracle E-Business Suite responsibility-based security (usually referred to as “function security”) and Role-Based Access Control. According to Sara Woodhull in a separate post, the whitepaper is written for Oracle E-Business Suite system administrators, super-users, and implementers. It applies to Oracle E-Business Suite Release 11i, 12.0, and 12.1.
(Get More Information . .) open to premium members only

12 Jul 2012 Delegation of Solaris Zone Administration [26855]
Enabling Management of Distinct Zones by Particular Admins

In Delegation of Solaris Zone Administration, Darren Moffat blogs that, with the Zone Delegation feature built in to Solaris 11, users delegate management of distinct zones. Moffat uses the example of zones named zoneA through zoneF and three admins to each of whom it is necessary to grant a subset of the zone management. One can either add the admin resource to the appropriate zones via zonecfg(1M) or store data directly in the RBAC database, showing all three admins and zones. One can also create an RBAC profile that then assigns the appropriate degree of administrative responsibility to each admin.
(Get More Information . .) open to premium members only

 1 2 3 4 5 6 next

!-- end archive_section.tpl -->