Skip to end of metadata
Go to start of metadata
 

Role-based Access Control (RBAC)

There are a number of issues arising in conjunction with the Identity and Access Management (IAM) project concerning role-based authentication and authorization.

Documents

 
Icon

To comment on draft documents or any other aspect of IT policy, please add your comments at the bottom of the page in question. Comments are welcome on any document at any time. Formal review is a publicized period of time where comments are proactively invited.

 

Status

This initiative is now included under the Identity Management (IdM) initative.

                                                  

  • Coordinating with IAMP.
Currently at IT policy process step 3. Elaboration.
The stakeholders consider the issues and present recommendations to the sponsors.

History

04/23/09

PPT Meeting. Policies arising from the IAM project may cover RBAC. There may be elements of RBAC policy in IRM. Next steps: Perhaps the PPT could ask someone from the IAM project to brief the PPT on how they plan to handle policy? TBD.

04/06/09

IT Policy Forum. RBAC tied for second (with Personally Owned Devices) when voting to prioritize posssible initiatives in the IT Policy Plan for FY 2009-2010.

04/14/08

2008-04-14 IAM Initiative Review and Status Update {RTF) (Presented at the 4/14 IT Policy Forum Status of the entire IAM initiative. Includes: business drivers, project organization, current status)

Previous

PASE Policy Working Group. See: PASE Policy Document Repository

Additional Pages

Contact