|
||
How to administer an access control system.The topic of this article is how to administer an access control system.Basically, an access control system is a way of controlling who can get to certain information in your system, or who can even access your system.Access control technology is based on technology that was originally developed by the Department of Defense to control access to top secret and sensitive information. Most access control is based on either physical controls, such as perhaps biometrics or even just a locked door, but it also is system based.It can be relatively easy to access a system, such as simply entering a password, or you can have a highly complex system of access control that is based on the structure of your company, on the classification of documents (secret, top secret, or top top top secret), or some other system.The controls can either be implemented in the computer system itself, or they can be external to the system.The most complex system of access control would be a system like in the Mission Impossible movies.The simplest would be simply typing in a password to access a computer or a system. Each different form of access control has a different method of administration.It really all depends on what kind of access control you choose-biometrics, system based, etc.This particular article is going to talk about how to administer a Role-Based Access Control system.Role-Based Access Control is a way of controlling access to different resources on a computer.It allows you to control what information a computer user can get to, which programs a particular user can run, and what modifications that particular user can make on the computer.Role-Based Access Control is suitable for systems that have both classified and non-classified information stored in them.
So when you set up your access control system, you will assign certain available operations and data to each particular role.As the administrator of the access control system, you can easily assign individuals to particular roles, revoke those roles, change roles around, change the access available to the certain roles, and more.In role-based access control, you will identify the functions of the user's job, you will decide the minimum amount of abilities necessary for that individual to complete that job, and then you will allow the individual access to the domain that has those privileges. No more, no less.Obviously, responsibilities will overlap, and so people in different roles will have access to the same information in certain cases.With Role-Based Access Control, you can define certain general operations that everyone can have access to, and you can set up role hierarchies that mirror the structure of your business or organization.So someone who is higher up can have all of the privileges of someone lower down, if you desire to organize things that way. This is just a brief overview of how you can administer a certain kind of access control, Role-Based Access Control.Role-Based Access Control is one of the most flexible and one of the most convenient access control systems out there.Whatever access control system you decide is best for your business will have a different method of administration.Talk to your supplier and to the marketer of your system for detailed information on how to administer access control. |
||
Copyright 2003-2020 by BusinessKnowledgeSource.com - All Rights Reserved
Privacy Policy, Terms of Use |