We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What Is the Role Hierarchy?

By T.S. Adams
Updated May 16, 2024
Our promise to you
EasyTechJunkie is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At EasyTechJunkie, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

A role hierarchy is an organizational term most often used in databases and computer security systems. Users possess escalating roles that branch upward like the branches of a tree. As users of the system are promoted through these roles. They inherit the additional attributes, duties, and related variables of the role they adopt, without losing any of their attributes from their former role(s). The advantage to this is that it allows for a simple organizational standard for designing databases and security permissions. Disadvantages come from the fact that oftentimes, individual roles do not bleed neatly into one another, forcing awkward or improper constructions in the design of the system.

Picture a snowball rolling downhill. As it progresses, it accumulates more and more size without losing any of its original content. By the time it reaches the bottom of the hill, or the higher tier of the database, it has expanded far beyond its original size. This is the basic concept of a role hierarchy.

For example, consider a role hierarchy of an employees database. The most elementary tier of the database will be the Employees table, which naturally contains every record of every person working at the company, as they are all employees. Above Employees might be the Managers table, which might add additional attributes such as lists of the employees that each manager supervises. The Managers table will naturally be more exclusive, however; as every manager is an employee, but not every employee is a manager. The role hierarchy table will continue to "trickle up" in a pyramid-like shape, possibly adding a table for Branch Managers, Corporate Managers, Vice-Presidents, and so on.

From a security perspective, the peak of the hierarchy would be an unrestricted system administrator, which can perform any modification or change to a computer system. Whereas the lowest tier would be a simple user, who might only be able to access a handful of programs without being allowed to make any substantial changes. In both cases — either a database or security situation — the role hierarchy schema allows an effective "bleeding upward," allowing users of the system to migrate from one position to the next in a fairly linear format.

The downside to this comes from complex organizations, in which the attributes of one entity do not necessarily bleed smoothly into another. Consider a case where employees are promoted to a management position after holding a role as either a programmers or human resources workers. Assume that company rules prohibit individuals from working as both a programmer and a human resource workers. Now, according to the role hierarchy structure, everyone in the Managers table must inherit both the attributes of a programmer and those of someone working in human resources. This results in wasted space and null attributes within the database, as no single manager will possess both the attributes of a programmer and someone in human resources.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Discussion Comments

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.