This section describes the following topics for Identity Server roles.
Section 2.1, Understanding RBAC in Access Manager
Section 2.2, Creating Roles
Section 2.3, Example Role Policies
Section 2.4, Creating Access Manager Roles in an Existing Role-Based Policy System
Section 2.5, Mapping Roles between Trusted Providers
Section 2.6, Enabling and Disabling Role Policies
Section 2.7, Importing and Exporting Role Policies