software architecture Archives - TuxCare

Concepts You’re Using Without Even Knowing: Role-Based Access Control

Welcome to our new series about technical concepts and features that you’re probably using every day without even knowing about it. We are running this series so that you get a deeper understanding of how these concepts impact your day-to-day operations, and how to make the best use of the tools at your disposal.

Our first article is about role-based access control, a commonly used way to manage application permissions and access to network resources based on the role allocated to a user. It’s also known as role-based security and it’s a concept every sysadmin should fully grasp.

Continue reading “Concepts You’re Using Without Even Knowing: Role-Based Access Control”

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching