•Role-based security is used to implement security measures based on the role assigned to the users in the organization. Then we can authorize users based on their roles in the organization. For example, windows have role-based access like user, administrators, and guests.
Role-based security allows you to partition your web site according to the "role" of the user. That means that once a user is logged-in, the determination as to whether or not access to a resource is granted is based on the roles a user plays--such as "administrator", or "premium subscriber", or "guest", for example.