Strategy of designing the permissions or authorizations that are granted in the system based on the roles a person performs and/or their position in the organizational hierarchy. The permissions to access and update information in the systems are assigned to these roles.
« Back to Glossary IndexRole Based Security
« Back to Glossary Index