Difference between revisions of "System-user role"
Line 1: | Line 1: | ||
− | A [[system-user role]] (or, alternatively spelt, [[system user role]]; also known as [[user access level]] or [[system-granted identity]]; [[user role]] in [[WordPress]]; [[user group]] in [[MediaWiki]]; [[IAM role]] in [[AWS]]; hereinafter, the ''Role'') is a set of capacities often called permissions that a system grants to any user who belongs to a particular ''Role''. | + | A [[system-user role]] (or, alternatively spelt, [[system user role]]; also known as [[user-access level]] or [[system-granted identity]]; [[user role]] in [[WordPress]]; [[user group]] in [[MediaWiki]]; [[IAM role]] in [[AWS]]; hereinafter, the ''Role'') is a set of capacities often called permissions that a system grants to any user who belongs to a particular ''Role''. |
The ''Role'' is an identity that a system assigns to a particular user with permission policies that determine what the identity can and cannot do in the system. However, the ''Role'' does not have any credentials (password or access keys) associated with it. Instead of being uniquely associated with one person, a role is intended to be assumable by anyone at a specific level of permissions. | The ''Role'' is an identity that a system assigns to a particular user with permission policies that determine what the identity can and cannot do in the system. However, the ''Role'' does not have any credentials (password or access keys) associated with it. Instead of being uniquely associated with one person, a role is intended to be assumable by anyone at a specific level of permissions. |
Revision as of 22:54, 13 October 2018
A system-user role (or, alternatively spelt, system user role; also known as user-access level or system-granted identity; user role in WordPress; user group in MediaWiki; IAM role in AWS; hereinafter, the Role) is a set of capacities often called permissions that a system grants to any user who belongs to a particular Role.
The Role is an identity that a system assigns to a particular user with permission policies that determine what the identity can and cannot do in the system. However, the Role does not have any credentials (password or access keys) associated with it. Instead of being uniquely associated with one person, a role is intended to be assumable by anyone at a specific level of permissions.