An ongoing & curated collection of awesome RBAC software, software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Roles-Based Access Control (RBAC) in Cybersecurity.
Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources
Access control based on user roles (i.e a collection of access authorizations a user receives based on an explicit or implicit assumption of a given role). Role permissions may be inherited through a role hiearchy and typically reflect the permissions needed to perform defined functions within an organization. A given role may apply to a signle indivisual or to several individuals.