Previous Topic: Role Based Access Control (RBAC)

Next Topic: CA RCM Technology

Basic Concepts and Architecture

CA RCM implements RBAC standards without affecting an organization's on-going operation. CA RCM implements the concept of a sandbox to separate CA RCM's operation from the organization's on-going security environment (production server). The assumption is that when working with CA RCM, existing access definitions must first be imported into a sandbox. A sandbox is an offline PC computer on which CA RCM is installed where role discovery and audit activities are performed without affecting current operations of the organization. All work on discovering new or refining existing access definitions is performed in the CA RCM environment.

CA RCM defines roles as a group of users that have a common set of privileges. By users, CA RCM refers to people or functions: employees, customers, suppliers, representatives, and so on. A resource is a specific right of access that may be an operation or object in formal RBAC terms. Thus, a resource can be as specific as a particular access right (Read/Write/Execute) to a specific file in a specific file system on a specific machine, and it can also be used to provide a model for access to a computer system (such as, a user group on that machine). A privilege is a connection between a user and a resource, indicating that this user possesses a specific access right. A role can include a set of users and a set of resources, with the semantics being that all users in the user set are allowed access to all resources in the resource set.

Most of CA RCM's work is performed within a CA RCM configuration that is automatically created when access data is imported into CA RCM. By configuration, CA RCM means a data structure that holds a snapshot of the definition of users, resources and roles (if already defined) as well as the relevant relationships (privileges) between them.

The following shows the CA RCM architecture and how it relates to existing systems in your enterprise: