:
Startseite » Identity Management » Role Based Access Control » When roles, when rules? » Implementation efforts