[[_policy_rbac]] = Role-Based Policy You can use this type of policy to define conditions for your permissions where a set of one or more roles is permitted to access an object. By default, roles added to this policy are not specified as required and the policy will grant access if the user requesting access has been granted any of these roles. However, you can specify a specific role as <<_policy_rbac_required, required>> if you want to enforce a specific role. You can also combine required and non-required roles, regardless of whether they are realm or client roles. Role policies can be useful when you need more restricted role-based access control (RBAC), where specific roles must be enforced to grant access to an object. For instance, you can enforce that a user must consent to allowing a client application (which is acting on the user's behalf) to access the user's resources. You can use {project_name} Client Scope Mapping to enable consent pages or even enforce clients to explicitly provide a scope when obtaining access tokens from a {project_name} server. To create a new role-based policy, select *Role* in the dropdown list in the upper right corner of the policy listing. .Add Role-Based Policy image:{project_images}/policy/create-role.png[alt="Add Role-Based Policy"] == Configuration * *Name* + A human-readable and unique string describing the policy. A best practice is to use names that are closely related to your business and security requirements, so you can identify them more easily. + * *Description* + A string containing details about this policy. + * *Realm Roles* + Specifies which *realm* roles are permitted by this policy. + * *Client Roles* + Specifies which *client* roles are permitted by this policy. To enable this field must first select a `Client`. + * *Logic* + The <<_policy_logic, Logic>> of this policy to apply after the other conditions have been evaluated.