RoyalTech wrote: » Regarding the role-based access model, in DG's security+ book, he describes that roles are often implemented as groups. My question is when would they not be implemented as groups and how & where are you assigning users under those circumstances?