Security Role Management Best Practices

Поделиться
HTML-код
  • Опубликовано: 9 янв 2025

Комментарии • 9

  • @KaraWadeBrown
    @KaraWadeBrown Год назад +1

    You made a solid impression:) i couldn’t be more gratified, great job

    • @jeffcrume
      @jeffcrume Год назад

      Thanks so much for the kind complements!

  • @nelsonmacy1010
    @nelsonmacy1010 Год назад +1

    Outstanding. Very good design

  • @KaraWadeBrown
    @KaraWadeBrown Год назад +1

    Company’s pay 40,000 dollars for the amount of money saved in the long run a huge consulting idea like that would save so much money and time :) really your a natural. Are you a consultant for ibm?

    • @jeffcrume
      @jeffcrume Год назад

      I actually work in technical sales but my job involves a certain degree of high level consulting

  • @shin-jo2801
    @shin-jo2801 2 года назад +1

    this reminds me of database normalization for some reason. Great frikkin content IBM

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt Месяц назад

    nice information

  • @benjamine.ndugga729
    @benjamine.ndugga729 2 года назад +2

    Each Role should be given entitlements but in a scenario where you have multiple roles assigned to a user, those entitlements should not be duplicated...

  • @TheAshsonu
    @TheAshsonu 2 года назад

    This seems fairly close to RBAC in k8s, in RBAC roles are bucket of capabilities and rolebindings are rules which allows users to be linked to these roles.