Role-based access control
Acronym | RBAC |
---|---|
Status | supported |
Description
Access control and provisioning based on concept of roles. MidPoint roles can form a hierarchy by using inducement relations.
Documentation
Version | Introduction | Guides | Configuration | Examples | Plans |
---|---|---|---|---|---|
4.9 | MidPoint Role-Based Access Control Mechanism |
||||
Development | MidPoint Role-Based Access Control Mechanism |
||||
4.8 | Advanced Hybrid RBAC |
||||
All versions | Retirement of Roles |
Related Features
-
Risk management (planned)
Compliance
This feature is related to the following compliance frameworks:
-
ISO/IEC 27001 5.2: Information security roles and responsibilities
-
ISO/IEC 27001 5.10: Acceptable use of information and other associated assets
-
ISO/IEC 27001 5.23: Information security for use of cloud services
-
ISO/IEC 27001 5.24: Information security incident management planning and preparation
-
ISO/IEC 27001 5.26: Response to information security incidents
-
ISO/IEC 27001 5.31: Legal, statutory, regulatory and contractual requirements
-
ISO/IEC 27001 6.3: Information security awareness, education and training
-
ISO/IEC 27001 6.6: Confidentiality or non-disclosure agreements
-
ISO/IEC 27001 8.19: Installation of software on operational systems
-
ISO/IEC 27001 8.27: Secure system architecture and engineering principles
-
ISO/IEC 27001 8.31: Separation of development, test and production environments
-
ISO/IEC 27001 8.34: Protection of information systems during audit testing