Verified
RBAC implementation based upon the role mentioned in the administrator profiles. Roles are implemented according to profile. Also access to certain files and configuration can be assigned through the user profile. It also let RBAC to differentiate high technical knowledge roles from low ones.