Goals: 1. To become better acquainted with Role Based Access Control (RBAC) 2. To understand the benefits and drawbacks of using RBAC 3. To understand
Goals: 1. To become better acquainted with Role Based Access Control (RBAC) 2. To understand the benefits and drawbacks of using RBAC 3. To understand the challenges involved in implementing RBAC enforcement mechanisms 4. To develop appreciation for the RBAC model and its numerous applications. Overview In this assignment you will develop a mechanism for enforcing RBAC policies. When launched your program shall read and parse the following two files: 1. user-role assignment (URA) file: stores user-role assignments. 2. permission-role assignment (PRA) file: stores permission-role assignments The program then displays login prompt login Next, the user enters his/her username and presses . The program then checks if the user is present in the URA file (based on the parsed information). If not so, then the program reports an error and re-displays the prompt: login: hernan ERROR: user hernan is not in the database! login Otherwise, the program logs the user in, and displays the command prompt login: hernan Welcome hernan! cmd> From here, the user may issue commands of the form
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance