Skip to main content

Hitachi ID certification

Product Sites

Role Based Access Control - Overview

This document is intended to introduce readers to role based access control (RBAC), as applied to large numbers of users and multiple IT systems. It is organized into five distinct parts:

  1. Development of RBAC concepts from a simple model to a complex but realistic privilege management infrastructure.
  2. Business drivers to motivate organizations to use an RBAC system to manage security privileges.
  3. Process for deploying RBAC into an organization.
  4. Maintenance tasks for keeping a deployed RBAC system functioning smoothly.
  5. Organizational impact of the deployment project and of the running RBAC system.

Please register

Access to this document requires registration. Please fill in the form below. The full document will be e-mailed to you automatically.

Your company/organization name:
Your name:
Your title:
Your work telephone number:
Your work e-mail address:
Total number of staff in your company:
Please check the information you entered above before continuing.
Click to continue:
page top page top