One of three Role Mining approaches.

By-example Role Mining approach asks managers to identify which of their subordinates do the same job. Check to see if those Users have the same Privileges. If they do, define a Role to represent that group of Users and attach them to the Role.

Optionally, seek out Users who report to other managers that have the same Privileges, and attach them as well.

The other two Role Mining approaches are Top-down Role Mining and Bottom-up Role Mining.

Return to IT Security Concepts