RBAC: Difference between revisions

From HaFrWiki42
Jump to navigation Jump to search
Line 28: Line 28:
# Model Database: https://www.mind-it.info/wp-content/uploads/2011/06/mysql_5.txt
# Model Database: https://www.mind-it.info/wp-content/uploads/2011/06/mysql_5.txt
# Model PHP: https://www.mind-it.info/2009/10/02/a-query-engine-for-php
# Model PHP: https://www.mind-it.info/2009/10/02/a-query-engine-for-php
== Example Energy ==
As always an example makes more clear than anything else.
Suppose we take a generic app as an example.
The following fictive user and roles are defined:
{| class="wikitable" width="1100px"
|- style="vertical-align:top;"
| width="33%" |
{| class="wikitableharm" width="450px"
! width="200px" | User
! width="200px" | Role
|-
| Harm || Admin
|-
| Riet  || Writer
|-
| Jan  || Reader
|-
| Guest || Guest
|}
| width="67%" |
{| class="wikitableharm" width="650px"
! width="200px" | Role
! width="200px" | Permission
! width="200px" | Object
|-
| Admin || CRUD || Energy-tabHome
|-
| Writer || RU ||  Energy-tabHome
|-
| Reader || R || Energy-tabHome
|-
| Guest || R || Energy-tabHome
|}
|}


== See also ==
== See also ==
<span class="editsection">[[#content|top]]</span>
<span class="editsection">[[#content|top]]</span>
* [https://csrc.nist.gov/CSRC/media/Presentations/Role-Based-Access-Control-(RBAC)-Presentation/images-media/rbac-slides-doe.pdf NIST CSC RBAC], National Institute of Standards and Technology (NIST), Computer Security Resource Center (CSRC) Role Base Access Control (RBAC) Presentation.  
* [https://csrc.nist.gov/CSRC/media/Presentations/Role-Based-Access-Control-(RBAC)-Presentation/images-media/rbac-slides-doe.pdf NIST CSC RBAC], National Institute of Standards and Technology (NIST), Computer Security Resource Center (CSRC) Role Base Access Control (RBAC) Presentation.


== Reference ==
== Reference ==

Revision as of 10:55, 7 August 2018

Role Based Access Control (RBAC) is a model for giving a user access to one or more resources.
NIST CSRC RBAC is the de facto implementation [1].

Introduction

RBAC is an access control mechanism which:

  • Describes complex access control policies,
  • Reduces errors in administration,
  • Reduces cost of administration.
RBAC
Entity Relationship
The NIST RBAC Model uses a limited set of concepts to define an RBAC system as depicted below.
The system has (1) users, users have (2) sessions and sessions and users have (3) roles assigned to them.
Each role consist of (4) permissions and permissions are based on (5) objects and (6) operations.
The model contains 6 main entities:
  1. user: this contains all the user data
  2. session: this contains the session data for all currently logged on users
  3. role: this contains all the roles that are defined
  4. permissions: this contains all the permissions based on objects and operations
  5. object: objects are the items that require protection
  6. operation: operations are the actions that are performed on the objects
  1. Model and Entity Relation taken from Mind-it [2].
  2. Model Database: https://www.mind-it.info/wp-content/uploads/2011/06/mysql_5.txt
  3. Model PHP: https://www.mind-it.info/2009/10/02/a-query-engine-for-php

Example Energy

As always an example makes more clear than anything else. Suppose we take a generic app as an example. The following fictive user and roles are defined:

User Role
Harm Admin
Riet Writer
Jan Reader
Guest Guest
Role Permission Object
Admin CRUD Energy-tabHome
Writer RU Energy-tabHome
Reader R Energy-tabHome
Guest R Energy-tabHome


See also

top

  • NIST CSC RBAC, National Institute of Standards and Technology (NIST), Computer Security Resource Center (CSRC) Role Base Access Control (RBAC) Presentation.

Reference

top

  1. NIST - CSRC National Institute of Standards and Technology - Computer Security Resource Center - Role Based Access Control]
  2. Mind-it, NIST RBAC Data Model