Skip to end of metadata
Go to start of metadata

Role-based Access Control (RBAC)

There are a number of issues arising in conjunction with the Identity and Access Management (IAM) project concerning role-based authentication and authorization.



To comment on draft documents or any other aspect of IT policy, please add your comments at the bottom of the page in question. Comments are welcome on any document at any time. Formal review is a publicized period of time where comments are proactively invited.



This initiative is now included under the Identity Management (IdM) initative.


  • Coordinating with IAMP.
Currently at IT policy process step 3. Elaboration.
The stakeholders consider the issues and present recommendations to the sponsors.



PPT Meeting. Policies arising from the IAM project may cover RBAC. There may be elements of RBAC policy in IRM. Next steps: Perhaps the PPT could ask someone from the IAM project to brief the PPT on how they plan to handle policy? TBD.


IT Policy Forum. RBAC tied for second (with Personally Owned Devices) when voting to prioritize posssible initiatives in the IT Policy Plan for FY 2009-2010.


2008-04-14 IAM Initiative Review and Status Update {RTF) (Presented at the 4/14 IT Policy Forum Status of the entire IAM initiative. Includes: business drivers, project organization, current status)


PASE Policy Working Group. See: PASE Policy Document Repository

Additional Pages