Remote Multimedia Device Access
Porting and Updating Scientific Measurement Software
Open Source based Embedded Device
Distributed Application Error Aggregation, Monitoring and Reporting
Business Intelligence Application
Utility Operating System
Enterprise Data Architecture
The azad client recognized a need for more organization and security in their procedures for granting access to valuable information technology resources. The current best-practice method for managing access control is based on the assignment of Roles to Users. This process has resulted in a technique which the IT industry calls Role-Based Access Control or RBAC, and is formalized as an ANSI standard. In order to implement an effective RBAC system, an enterprise needs to build an RBAC Reference Model database. The RBAC database is then used by a computer access mechanism, such as Active Directory, to determine how access will be granted to computer system users and services.
azad Approach & Solution:
The azad client wanted to implement an RBAC reference model with the
To fulfill this assignment, the azad consultant researched the standards and
The client has been able to use the model as a basis for several internal staffing reorganizations and for developing business processes and operating procedures.