Learn how role-based access can help you secure your sensitive information.
Written by Carol Woodbury
Editor's Note: This article is an introduction to the Webcast "5 Steps for Implementing Role-Based Access on the IBM i" available to view free from the MC Press Webcast Center.
A good place to start with a discussion of role-based access is by sharing some thoughts on just what the idea of access to computer information and controlling that access mean. When we speak of "access" to a computer, what we are referring to is the ability to do something with the computer—for example, to read, write, or change information. When you decide you need to "control access," what you are doing is explicitly enabling or restricting, in some way, the ability to read, write, or change information. Access controls can not only dictate who or what process may have access to specific information on a computer, it can also specify the type of access that is permitted.