Watch this video on YouTube
In an organization that uses RBAC, which of the following is the best approach for granting temporary access to a user outside of their normal role?