Access control defines which resources and actions are available to a user depending on their permissions or role in the system.
The process starts with authentication, which verifies the user’s identity, and continues with authorization — checking whether the user is allowed to perform a particular action.
There are different access control models. In this article we will look at the most common ones: role-based (RBAC) and attribute-based (ABAC) models.