Role Based Security
Revision as of 14:04, 6 September 2007 by Julia Decker (talk | contribs)
Revision as of 14:04, 6 September 2007 by Julia Decker (talk | contribs)
Role security is based on a role that you associate with the user. With this scheme, you first create one or more roles, and then associate each user with one or more of those roles.
By setting a default user role in your personal settings, the system will always assume that you are adding someone using a specific role when you add a new person to the system.
Advantages
There are three advantages to role-based security:
- You can make individuals, regardless of their organisation, members of a role and give them access to a resource.
- When you move the user to another organisation, it does not effect their permission to access a resource.
- Associating the role with the resource is less time consuming if the alternative is to associate the resource to many organisations.
Disadvantages