Access Control Design Best Practices
Follow these best practices to create access control roles.
-
Create a role for each type of CRUD access for each application. Name each role to identify it appropriately. For example: create a role for each of the following:
-
Audit Entity - Create
-
Audit Entity - Delete
-
Audit Entity - Read
-
Audit Entity - Update
-
-
Assign the role as appropriate for specific groups.
-
Document which users are assigned what kind of access rights within your application.