Summary
Role-based access control (RBAC) is a key requirement of modern security standards. In this chapter, we detailed the steps to configure RBAC to adhere to the principle of least privilege. This included learning how to configure user access at the organization and network levels within the Dashboard hierarchy. We also explained how special roles can be created for specific use cases. This included creating roles with control over specific ports, camera-only and sensor-only admins, as well as the creation of limited access roles for Systems Manager admins.