International Journal of Engineering and Information Systems (IJEAIS)
  Year: 2022 | Volume: 6 | Issue: 9 | Page No.: 46-50
Analysis of A Role-Based Access Control for Information System Download PDF
Dilnoza Sodikova and Muborak Abduvaliyeva

Abstract:
Many industries have implemented access control lists. This concept can be used to manage user authorization in a large organization. It can be based on a standard role-based access control (RBAC) or other equivalent. Role access control lists are developed together with modules such as identification, authentication, authorization and auditing that can make the system efficient. Defining roles helps define each task correctly to avoid conflicts when the system is installed. After identification is provided, the system authenticates using a secure database based on active directory or software hardware. Strong authentication and encrypted role-based login and usage help increase user confidence in the system. The database may be located on the same system or elsewhere. The structure of the access control list and the relationship with the database determine the efficiency and performance of the system. After the system is operational, an audit trail is provided to verify all processing and actions. A good policy defines the correct approach to a specific task. Role and policy management helps implement access control lists in a way designed to reduce potential risks and vulnerabilities through network deployment or VPN workflow. This article further discusses architecture, design, and policy through observations and recommendations for improving access management maturity in an organization.