OpenIAM Access Manager manages Groups, Roles, Permissions and Resources. Groups are generally used to model organizational structure where as Roles are used to model a person’s function with in the enterprise.

In RBAC, a subject is given one or more roles depending on the subject’s job. Access is determined by the subject’s role. In ABAC, access is determined by the attributes of the subject, attributes of the resource being accessed, environmental attributes and the desired action attribute. ABAC is implemented based on the XACML specification.

Role Based Access Control

  • Coarse-grained access control – based on subject, role and permissions
  • Ease of administration – roles created for job functions
  • Subject has to be assigned to a role and execute actions that are authorized for the role
  • Assigns permissions to job functions based on operations rather than to resource objects
  • Enables the creation of:
    • Relationships between Users, Groups, Roles, Resources
    • Creation and enforcement of policies


Developing an access control strategy based on Role Based Access Control provides a clean and flexible model that is easier to maintain over a long period of time.

Polices may be associated with a person’s role.  For example, someone in a Bank Teller role may be permitted to access applications pertinent to his or her role, but not permitted to access applications related to someone in a Loan Officer role.

Recent Posts
OpenIAM v4.1 provides organizations with a feature complete IAM platform which leverages modern technologies such as Docker, Kubernetes, Elasticsearch and Redis to provide a user-friendly, small footprint solution which is currently in production at mid to large enterprises globally. Cortlandt...
CORTLANDT MANOR, NY JUNE 21, 2016: OpenIAM, a top Open Source Identity and Access Management vendor, has bolstered security at organizations while increasing employee productivity through its automated Self-Service Portal. In lieu of calls to the help desk due to...
This month, OpenIAM was featured in the technology magazine CIO Review.
Many of our Identity Management customers have a Microsoft Environment which consists of Microsoft Active Directory and complementary components such as Microsoft Exchange, Lync, SQL server, etc. Many of these customers have, or are in the process of adopting Microsoft’s...
read more
Sign in
Lost your password?

Products of Interest

How did you hear about us?

Registration confirmation will be emailed to you.