Skip to content

Commit 7f0642f

Browse files
authored
Merge pull request #2572 from cncf/main
Sync branch dev-tw from main(20231031)
2 parents 7256de5 + f068808 commit 7f0642f

File tree

2 files changed

+14
-18
lines changed

2 files changed

+14
-18
lines changed

content/en/role-based-access-control.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,25 +2,25 @@
22
title: Role-Based Access Control (RBAC)
33
status: Completed
44
category: concept
5+
tags: ["security", "", ""]
56
---
67

78
## What it is
89

9-
Role-based access control (RBAC) is a method to regulate system and resource access based on individual user roles within an organization.
10-
Each job function has a specific role and permissions.
11-
For instance, a marketing team member may have permission to view sales deals in the pipeline (*read* permission) but won't be allowed to edit them (*write* permission).
12-
Sales and marketing have different permissions based on their roles, hence role-based access control, and the same applies to roles within engineering teams.
10+
Role-based access control (RBAC) is a security method of managing user access to systems, networks, or resources based on their role within a team or a larger organization.
11+
RBAC empowers IT administrators to identify the necessary level of access for all users with a particular job function and assign those users a role with a predefined set of permissions.
12+
Organizations utilize RBAC to provide their employees with varying levels of access tailored to their roles and responsibilities.
1313

1414
## Problem it addresses
1515

16-
Individually managing access permissions of multiple users across various system resources and data can be complex.
17-
After all, each user likely needs access to a different set of resources.
18-
Let's say an organization has 500 developers (users) and 300 resources with varying permission levels (read, write, and no access). The administrator must ensure each user has the correct permissions for all 300 resources.
19-
RBAC simplifies the process by providing predefined access control based on role groups.
16+
RBAC addresses the challenge of controlling the resources team members and applications can access,
17+
as well as the actions they can perform, especially as the number of applications and team members increases.
18+
Administrators must ensure that each user has the correct permissions for the resources they need to access.
19+
This task can become cumbersome and error-prone without a structured access control mechanism.
2020

2121

2222
## How it helps
2323

24-
RBAC provides granular control over user permissions within software systems.
25-
Depending on their roles, team members can modify a section, only view it, or have no access at all.
26-
This granular permission allocation allows team members with different roles to work on the same system while minimizing risk.
24+
RBAC provides IT teams with the capability to easily manage permissions for all users in a group simultaneously or make swift adjustments to an individual user's access level by assigning or removing a role.
25+
This safeguards sensitive data and ensures that employees can only access information and perform actions necessary for their job responsibilities.
26+
Overall, RBAC enhances access management, bolsters security, and boosts operational efficiency within organizations.

layouts/partials/footer.html

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,9 @@
1414
<a href="https://www.cncf.io/all-cncf/" class="hub-button">{{ T "footer_hub_button_text" }}</a>
1515
</div>
1616
<ul class="social-links">
17-
<li><a class="text-white" title="Cloud Native Computing Foundation on Twitter"
18-
href="https://twitter.com/cloudnativefdn"><svg xmlns="http://www.w3.org/2000/svg"
19-
viewbox="-0.61 -0.55 31.72 25.84">
20-
<path fill="currentColor"
21-
d="M30.579 3.018c-1.145.503-2.36.833-3.603.98A6.252 6.252 0 0 0 29.734.556a12.628 12.628 0 0 1-3.982 1.51A6.297 6.297 0 0 0 22.193.187a6.327 6.327 0 0 0-3.977.655A6.249 6.249 0 0 0 15.46 3.76a6.178 6.178 0 0 0-.398 3.978 17.93 17.93 0 0 1-7.165-1.887 17.784 17.784 0 0 1-5.769-4.614 6.182 6.182 0 0 0-.687 4.533A6.228 6.228 0 0 0 4.07 9.54a6.288 6.288 0 0 1-2.842-.777v.078c0 1.436.502 2.829 1.419 3.94a6.286 6.286 0 0 0 3.614 2.16 6.34 6.34 0 0 1-2.833.107A6.23 6.23 0 0 0 5.66 18.14a6.315 6.315 0 0 0 3.628 1.229 12.657 12.657 0 0 1-7.791 2.663c-.5 0-1-.03-1.497-.087a17.868 17.868 0 0 0 9.617 2.794c11.54 0 17.849-9.479 17.849-17.697 0-.27-.006-.538-.018-.805a12.692 12.692 0 0 0 3.13-3.22z" />
22-
</svg> </a></li>
23-
17+
<li><a class="text-white" title="Cloud Native Computing Foundation on X"
18+
href="https://x.com/cloudnativefdn"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 300 300" aria-label="X"><path fill="currentColor" d="M178.57 127.15 290.27 0h-26.46l-97.03 110.38L89.34 0H0l117.13 166.93L0 300.25h26.46l102.4-116.59 81.8 116.59h89.34M36.01 19.54H76.66l187.13 262.13h-40.66"/></svg>
19+
</a></li>
2420
<li><a class="text-white" title="Cloud Native Computing Foundation on Github"
2521
href="https://github.com/cncf"><svg xmlns="http://www.w3.org/2000/svg"
2622
viewbox="-0.1 0.21 24.7 24.14">

0 commit comments

Comments
 (0)