cc video for in an organization that uses RBAC, which of the following is the best approach for granting temporary access to a user outside of their normal
In an organization that uses RBAC, which of the following is the best approach for granting temporary access to a user outside of their normal role?