IGA-ordlista

Role-Based Access Control(RBAC)

Role-Based Access Control (RBAC) is a method of managing access to systems and data by assigning permissions to roles rather than to individual users. Users are then assigned to roles based on their job function, and they inherit the access that role provides.

How does Role-Based Access Control work?

The idea behind RBAC is straightforward. Instead of giving each user individual permissions to every system and resource they need, you define roles that represent job functions. Each role comes with a set of permissions. When someone is assigned to a role, they automatically get the access that role includes.

For example, you might define a "Marketing Team Member" role that includes access to the company's CMS, the social media management tool, the shared marketing drive, and a Microsoft 365 group for marketing communications. When a new marketer joins, you assign them the role and they get all of that access at once. No need to set up each permission separately.

This is a significant improvement over the alternative — managing access on a per-user, per-resource basis — which quickly becomes unmanageable as organizations grow.

Why is RBAC important?

RBAC solves several problems at once.

It simplifies access management. Instead of maintaining individual permission sets for every employee, you manage a smaller number of roles. This reduces the administrative burden on IT, especially during onboarding and role changes.

It supports the principle of least privilege. When roles are well-defined, users only get the access they need for their job. They do not end up with extra permissions because someone copied another user's access during onboarding — a common pattern that leads to permission creep over time.

It makes auditing easier. When an auditor asks "who has access to the finance system?", you can answer by listing the roles that include that access and who holds those roles. That is much cleaner than tracing individual permission assignments across hundreds of users.

It reduces errors. Manual permission assignment is error-prone. People get too much access, too little, or the wrong access entirely. RBAC reduces these mistakes by standardizing what each role receives.

How does RBAC work in Microsoft Entra ID?

In Entra ID, RBAC is implemented primarily through groups and application role assignments.

Security groups are the most common way to manage role-based access. You create a security group for each role (for example, "SG-Marketing-Team") and assign the appropriate application access, SharePoint permissions, and Teams memberships to that group. When a user joins the marketing team, you add them to the group and they inherit all the associated access.

Dynamic groups take this further. Instead of manually adding users to groups, you define rules based on user attributes. For example, a dynamic group could automatically include all users where the department attribute is set to "Marketing." When someone's department changes in Entra ID, their group memberships update automatically.

Entra ID app roles let you define roles within specific applications. For enterprise apps registered in Entra ID, you can create app roles (like "Admin," "Editor," "Viewer") and assign users or groups to those roles. The application then receives the role information in the authentication token and enforces the appropriate permissions.

Azure RBAC is a separate but related concept. It controls access to Azure resources (virtual machines, storage accounts, subscriptions) through built-in and custom roles. This is relevant if your organization uses Azure infrastructure, but it is distinct from application-level RBAC.

What does a good RBAC model look like?

A well-designed RBAC model for a mid-sized company typically has a few layers.

Baseline roles that apply to everyone. All employees get access to Microsoft 365 basics, the company intranet, and the all-staff Teams channel. This is your "Employee" role.

Department roles that reflect team membership. Marketing gets marketing tools. Finance gets finance tools. Engineering gets development environments. These roles align with organizational structure.

Job-specific roles for specialized access. A database administrator might need elevated privileges that other IT team members do not have. A payroll manager might need access to HR systems that other finance team members should not see.

Temporary or project roles for time-limited access. Someone working on a cross-departmental project might need access to resources outside their normal role. These should have an expiration date.

The key is to keep it manageable. A company with 200 employees does not need 200 roles. Aim for the smallest number of roles that accurately reflects your organizational structure and access needs — somewhere between 10 and 30 roles is typical for a mid-sized company.

Common RBAC mistakes to avoid

Copying access from existing users. This is the most common way RBAC falls apart. Instead of assigning a proper role, IT copies the permissions of someone with a similar job title. Over time, this creates inconsistent access and permission creep. A proper RBAC model eliminates the need for this.

Too many roles. If every person has their own unique role, you have not implemented RBAC — you have just added an extra layer of complexity. Roles should be shared across multiple users.

Roles that never get reviewed. Business needs change. Teams restructure. Applications get retired. If you define roles once and never revisit them, they drift out of alignment with reality. Regular access certification reviews should include checking whether roles still make sense.

No process for role changes. When someone moves from marketing to sales, what happens to their old access? A good RBAC implementation, combined with a proper joiner-mover-leaver process, ensures that role changes trigger access updates automatically.

How does Adcyma help with RBAC?

Adcyma helps organizations define and enforce role-based access within Microsoft Entra ID. You can map roles to Entra ID groups, application assignments, and license allocations, then automate the assignment and removal of those roles based on HR data or lifecycle events.

When someone joins, changes roles, or leaves, Adcyma updates their Entra ID access according to the defined role model. This keeps access consistent, reduces manual work, and gives you a clear audit trail of who had which role and when.

For companies that have been managing access ad hoc through individual permission assignments, moving to a proper RBAC model through Adcyma is often the single biggest improvement they can make to their identity governance posture.

Se hur Adcyma hanterar detta:

Utforska styrning

Omsatt dessa begrepp i praktiken

Adcyma gor identitetsstyrning enkelt for foretag som anvander Microsoft Entra ID.