This section describes the following topics for Identity Server roles.
Section 8.2.1, Understanding RBAC in Access Manager
Section 8.2.2, Enabling Role-Based Access Control
Section 8.2.3, Creating Roles
Section 8.2.4, Example Role Policies
Section 8.2.5, Creating Access Manager Roles in an Existing Role-Based Policy System
Section 8.2.6, Mapping Roles between Trusted Providers
Section 8.2.7, Enabling and Disabling Role Policies
Section 8.2.8, Importing and Exporting Role Policies