Skip to main content
Image
purple hex pattern
Image
Woman using a phone

Flexible role definition

With role-based access control (RBAC), it is a user’s function that determines their privileges. Permissions may include access, read, write, share, and decide.

 Roles can be assigned by authority or level in the organization, responsibilities, and/or skill competencies. With a role hierarchy, one type of role may include the attributes of many other individual roles.

Benefits

Image
icon of three users

Simplify user provisioning and management

Apply privileges that conform to a person’s role vs. establishing and managing user permissions individually.

Image
tachometer showing speed icon

Increase IT efficiencies

Realize systematic and repeatable user permissioning. Apply permission changes for many users at once by altering role privileges.

Image
ramp loading icon

Facilitate user onboarding

Add and manage users easily and effectively based on their role.

Image
hand silhouette icon

Reduce risk

Avoid provisioning user privileges individually to reduce the potential for error. Easily audit user permissions and address any issues.

Image
clipboard checked list icon

Realize least privileged access

Assign users the fewest number of permissions necessary to perform their role.

Image
gears icon

Enable API-based role provisioning

Implement user roles across APIs.

RBAC vs. ABAC

Attribute-based access control, or ABAC, exponentially increases your permissioning options with the addition of specific attributes, such as user location or time of day.

 While infinitely more flexible than RBAC, this flexibility also adds complexity that can increase risk if not implemented and managed properly. One of our cybersecurity experts would be happy to discuss whether RBAC or ABAC is the better fit for your requirements.

Request a demo today

An Entrust Identity portfolio specialist will be in touch with options soon.

Identity Portfolio

IAM

Identity as a Service


Cloud-based IAM solution with multi-factor authentication (MFA), passwordless access, and SSO.
IAM

Identity Enterprise


Identity Enterprise multi-factor authentication establishes and maintains trusted identity for all users, providing strong digital security for your enterprise.
IAM

Identity Essentials


Use Identity Essentials to keep your systems and data safe with multi-factor authentication and more.

Our identity portfolio capabilities:

Authenticate

Streamline the onboarding of diverse users and devices with a wide range of technologies.

Authorize

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Transact and Manage

Continuously protect against advanced threats with technology from behavior analytics to fraud detection.

The identity portfolio suited to your authentication needs