Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

role-based access control (RBAC)

Abbreviations / Acronyms / Synonyms:

Definitions:

  Access control based on user roles (i.e., a collection of access authorizations a user receives based on an explicit or implicit assumption of a given role). Role permissions may be inherited through a role hierarchy and typically reflect the permissions needed to perform defined functions within an organization. A given role may apply to a single individual or to several individuals.
Sources:
CNSSI 4009-2015

  A model for controlling access to resources where permitted actions on resources are identified with roles rather than with individual subject identities.
Sources:
NIST SP 800-95 under Role Based Access Control (RBAC) from OASIS XACML Profile for Role Based Access Control (RBAC)

  mapped to job function, assumes that a person will take on different roles, overtime, within an organization and different responsibilities in relation to IT systems.
Sources:
NIST SP 800-16 under Role-Based

  Access control based on user roles (i.e., a collection of access authorizations that a user receives based on an explicit or implicit assumption of a given role). Role permissions may be inherited through a role hierarchy and typically reflect the permissions needed to perform defined functions within an organization. A given role may apply to a single individual or to several individuals.
Sources:
NIST SP 800-53 Rev. 5 under role-based access control