Role-Based Access Control Lists
Description
-
Role-based Access Control allows granular control over super-user privileges. It defines roles and profiles for the type of administration performed and provides users with only enough privilege for their tasks. This is useful for ISVs and hardware vendors with products that require greater privileges to run than is normally granted to users. Today, such applications require execution under a super-user level, reducing customer appeal.
Requirements
- Supports all platforms
- No special hardware requirements
Benefits
- Applications can now be assigned just the privileges needed to perform a task, reducing security risks.
- Profiles and roles can be defined
for given product sets and implementation is entirely under the control of the ISV or customer.