When a user tries to perform an action in an RBAC system, what check does the system perform to decide if access is allowed?

Last Updated :
Discuss
Comments

When a user tries to perform an action in an RBAC system, what check does the system perform to decide if access is allowed?

Whether the user knows the database password

Whether the user’s IP address is static

Whether the user has been online for more than an hour

Whether the user’s assigned role includes the required permission for that action

Share your thoughts in the comments