ABAC vs. RBAC: A Comparison
In organizations, users of the network must be authenticated and authorized before accessing the system. This is especially the case for parts of the system capable of contributing to security breaches. Access control is a way of ensuring that users are who they say they are and that they have adequate access to company data. There are two key methods of controlling access for systems — role-based access control (RBAC) and attribute-based access control (ABAC)