Role-Based Access Control, or RBAC, is a way of enabling users to access the digital resources they need to perform their job. As the name implies, roles are created by the system administrator that reflect the different responsibilities assigned to user groups, managerial levels and so on.
Each role is then assigned permissions that enable access to the system resources someone in that position or group would require to carry out their responsibilities. When a new person is hired, they are assigned one of these predefined roles. Custom roles may also be created that provide a degree of differentiation within a given user group.
The following represent examples of user roles and their attendant permissions one might find in a given organization.
A user role is, in essence, a collection of permissions. Some common examples of permissions include:
Book a free Policy Workshop to discuss your requirements and get your first policy written by the Cerbos team



Join thousands of developers | Features and updates | 1x per month | No spam, just goodies.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.