This document discusses role-based access control (RBAC). It defines the core components of RBAC, including users, roles, operations, objects, and permissions. It also describes hierarchical RBAC and how roles can inherit permissions and users from other roles. Finally, it covers separation of duties, both static and dynamic, which place constraints on role assignments to prevent conflicts of interest. RBAC aims to simplify security administration by defining permissions based on roles rather than individual users.