Access control has been predominantly managed with a legacy static model based on user roles – called “Role-based Access Control”, or RBAC. Enterprises that use RBAC are now experiencing role explosion – and difficulty scaling RBAC to meet the complex access control requirements of today’s workforce and the need to share, securely.
- Understanding an attribute-based approach to access control and how it works
- How to leverage existing RBAC systems in an ABAC shift
- Key use cases driving the shift
- How to get started with ABAC