Access Control Design Best Practices

Follow these best practices to create access control roles.

  • Create a role for each type of CRUD access for each application. Name each role to identify it appropriately. For example: create a role for each of the following: 

    • Audit Entity - Create

    • Audit Entity - Delete

    • Audit Entity - Read

    • Audit Entity - Update

  • Assign the role as appropriate for specific groups.

  • Document which users are assigned what kind of access rights within your application.