Security: Identity and Access Management Controls - Paiet/Tech-Journal-for-Everything GitHub Wiki
Access control models
MAC
Based classifications assigned to users and objects
Both classifications have to match for access to be granted
DAC
Users are given access based on their identity.
Identities are granted different levels of abilities on and object
Role-based access control
Logical grouping of identities with similiar affliations
Access is granted or denied based on the role each group has within an organization
ABAC
Based on a single or combination of attributes
Compared to RBAC which allows access to the Managers role, ABAC could combine additional attributes such as Managers group, east coast region, from their primary computer, with employee ID XYZ.
Rule-based access control
Access to a resources is based on predetermined and defined rules
Access to a Sales team, resource during business hours
While the Sale group is a role but the "during business hours is the rule