{"version":"1.0","provider_name":"DevSecOps School","provider_url":"https:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"https:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"RBAC (Role-Based Access Control) in DevSecOps - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"dwfpCZXq5h\"><a href=\"https:\/\/devsecopsschool.com\/blog\/rbac-role-based-access-control-in-devsecops\/\">RBAC (Role-Based Access Control) in DevSecOps<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devsecopsschool.com\/blog\/rbac-role-based-access-control-in-devsecops\/embed\/#?secret=dwfpCZXq5h\" width=\"600\" height=\"338\" title=\"&#8220;RBAC (Role-Based Access Control) in DevSecOps&#8221; &#8212; DevSecOps School\" data-secret=\"dwfpCZXq5h\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"1. Introduction &amp; Overview What is RBAC (Role-Based Access Control)? RBAC, or Role-Based Access Control, is a security model used to restrict access to systems and data based on users\u2019 roles within an organization. Instead of assigning permissions to individuals directly, permissions are associated with roles, and users are assigned roles\u2014enabling centralized, scalable, and auditable ... Read more"}