Access control is traditionally modelled as a hierarchy. But in today's business environment, that does not work any more. External parties (partners, suppliers, customers) need access to our systems, and play different roles in these systems. We need to cut across hierarchies and graphs enable you to do so, quickly and efficiently.