Role-based access control

The following pages explain step by step what the authorization model looks like and how it can be managed in the form of roles.

Last updated