Skip to main content
purple hex pattern
Woman using a phone

Flexible role definition

With role-based access control (RBAC), it is a user’s function that determines their privileges. Permissions may include access, read, write, share, and decide.

 Roles can be assigned by authority or level in the organization, responsibilities, and/or skill competencies. With a role hierarchy, one type of role may include the attributes of many other individual roles.

Benefits

icon of three users

Simplify user provisioning and management

Apply privileges that conform to a person’s role vs. establishing and managing user permissions individually.

tachometer showing speed icon

Increase IT efficiencies

Realize systematic and repeatable user permissioning. Apply permission changes for many users at once by altering role privileges.

ramp loading icon

Facilitate user onboarding

Add and manage users easily and effectively based on their role.

hand silhouette icon

Reduce risk

Avoid provisioning user privileges individually to reduce the potential for error. Easily audit user permissions and address any issues.

clipboard checked list icon

Realize least privileged access

Assign users the fewest number of permissions necessary to perform their role.

gears icon

Enable API-based role provisioning

Implement user roles across APIs.

RBAC vs. ABAC

Attribute-based access control, or ABAC, exponentially increases your permissioning options with the addition of specific attributes, such as user location or time of day.

 While infinitely more flexible than RBAC, this flexibility also adds complexity that can increase risk if not implemented and managed properly. One of our cybersecurity experts would be happy to discuss whether RBAC or ABAC is the better fit for your requirements.

Request a demo today

An Entrust Identity portfolio specialist will be in touch with options soon.

Identity Portfolio

IAM

Identity Enterprise


Discover Identity Enterprise and learn how Entrust’s identity access management solutions can protect your organization from cyber risk.
IAM

Identity Essentials


Explore Identity Essentials and how its multi-factor authentication software can protect your enterprise.

Our Identity Portfolio Capabilities

Authenticate

Streamline the onboarding of diverse users and devices with a wide range of technologies.

Authorize

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Transact and Manage

Continuously protect against advanced threats with technology from behavior analytics to fraud detection.

Entrust Identity Use Cases