Role-Based Access Control (RBAC) Explained: How it works and when to use it