ROLE-BASED ACCESS CONTROL (RBAC)

Flexible role definition
With role-based access control (RBAC), it is a user’s function that determines their privileges. Permissions may include access, read, write, share, and decide.
Roles can be assigned by authority or level in the organization, responsibilities, and/or skill competencies. With a role hierarchy, one type of role may include the attributes of many other individual roles.
Benefits
Apply privileges that conform to a person’s role vs. establishing and managing user permissions individually.
Realize systematic and repeatable user permissioning. Apply permission changes for many users at once by altering role privileges.
Add and manage users easily and effectively based on their role.
Avoid provisioning user privileges individually to reduce the potential for error. Easily audit user permissions and address any issues.
Assign users the fewest number of permissions necessary to perform their role.
Implement user roles across APIs.
RBAC vs. ABAC
Attribute-based access control, or ABAC, exponentially increases your permissioning options with the addition of specific attributes, such as user location or time of day.
While infinitely more flexible than RBAC, this flexibility also adds complexity that can increase risk if not implemented and managed properly. One of our cybersecurity experts would be happy to discuss whether RBAC or ABAC is the better fit for your requirements.
Request a demo today
An Entrust Identity portfolio specialist will be in touch with options soon.Identity Portfolio
High assurance cloud-based workforce and consumer authentication. Credential-based access including passwordless authentication with unified SSO.
High assurance workforce and consumer authentication. Credential-based authentication including physical smart card issuance. On-premises solution.
Best-in-class MFA and VPN protection for Windows-based workforces.
Our identity portfolio capabilities:
Authenticate
Authorize
Transact and Manage
The identity portfolio suited to your authentication needs
- Consumer
- Workforce
- Citizen
Consumer
Attract and retain customers with best-in-class mobile and online banking services.
Give customers frictionless access to your portals—and build a great brand experience.
Our portfolio integrates seamlessly with your Customer Identity Access Management (CIAM) strategies.
We have the trusted identity tools you need to help you be successful and in compliance.
Workforce
Our portfolio offers the necessary technologies to integrate physical and logical secure access.
Empower workers everywhere with always-on access to VPNs and SaaS applications.
Protect the critical application credentials of system administrators or senior leaders.
Get a true passwordless SSO solution that supports all devices, PCs and Macs, and cloud and on-premises apps.
Our solutions ensure application security for contractors using on-prem or cloud apps.
Remove complexity and enable highly secure mobility with proven PIV solutions.
Citizen
Use our portfolio to secure and manage passports, national ID's and driver's licenses.