Skip to main content
purple hex pattern
Woman using a phone

Flexible role definition

With role-based access control (RBAC), it is a user’s function that determines their privileges. Permissions may include access, read, write, share, and decide.

 Roles can be assigned by authority or level in the organization, responsibilities, and/or skill competencies. With a role hierarchy, one type of role may include the attributes of many other individual roles.


icon of three users

Simplify user provisioning and management

Apply privileges that conform to a person’s role vs. establishing and managing user permissions individually.

tachometer showing speed icon

Increase IT efficiencies

Realize systematic and repeatable user permissioning. Apply permission changes for many users at once by altering role privileges.

ramp loading icon

Facilitate user onboarding

Add and manage users easily and effectively based on their role.

hand silhouette icon

Reduce risk

Avoid provisioning user privileges individually to reduce the potential for error. Easily audit user permissions and address any issues.

clipboard checked list icon

Realize least privileged access

Assign users the fewest number of permissions necessary to perform their role.

gears icon

Enable API-based role provisioning

Implement user roles across APIs.


Attribute-based access control, or ABAC, exponentially increases your permissioning options with the addition of specific attributes, such as user location or time of day.

 While infinitely more flexible than RBAC, this flexibility also adds complexity that can increase risk if not implemented and managed properly. One of our cybersecurity experts would be happy to discuss whether RBAC or ABAC is the better fit for your requirements.

Request a demo today

An Entrust Identity portfolio specialist will be in touch with options soon.

Identity Portfolio


Identity as a Service

Cloud-based IAM solution with multi-factor authentication (MFA), passwordless access, and SSO.

Identity Enterprise

Identity Enterprise multi-factor authentication establishes and maintains trusted identity for all users, providing strong digital security for your enterprise.

Identity Essentials

Use Identity Essentials to keep your systems and data safe with multi-factor authentication and more.

Our identity portfolio capabilities:


Streamline the onboarding of diverse users and devices with a wide range of technologies.


Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Transact and Manage

Continuously protect against advanced threats with technology from behavior analytics to fraud detection.

The identity portfolio suited to your authentication needs