Identity-based access control: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
Latest revision as of 00:24, 20 January 2026
Identity-based access control
Access control based on the identity of the user (typically relayed as a characteristic of the process acting on behalf of that user) where access authorizations to specific objects are assigned based on user identity.
Source: CNSSI 4009-2015 | Category: