hey everyone! :)
We just published a blog post, where we explore different approaches to enforcing
RBAC and
ABAC in an
enterprise context. As well as what drives the business need to choose between RBAC and ABAC, the various architectural deployments of these access control methods, and the implications of their selection.
If you’re interested,
you can find the blog with all the details here