Role-Based Access Control (RBAC)
User permissions that are assigned based on role within an organization.
Flexible role definition
With role-based access control (RBAC), it is a user’s function that determines their privileges. Permissions may include access, read, write, share, and decide.
Roles can be assigned by authority or level in the organization, responsibilities, and/or skill competencies. With a role hierarchy, one type of role may include the attributes of many other individual roles.
Benefits
Simplify user provisioning and management
Apply privileges that conform to a person’s role vs. establishing and managing user permissions individually.
Increase IT efficiencies
Realize systematic and repeatable user permissioning. Apply permission changes for many users at once by altering role privileges.
Facilitate user onboarding
Add and manage users easily and effectively based on their role.
Reduce risk
Avoid provisioning user privileges individually to reduce the potential for error. Easily audit user permissions and address any issues.
Realize least privileged access
Assign users the fewest number of permissions necessary to perform their role.
Enable API-based role provisioning
Implement user roles across APIs.
RBAC vs. ABAC
Attribute-based access control, or ABAC, exponentially increases your permissioning options with the addition of specific attributes, such as user location or time of day.
While infinitely more flexible than RBAC, this flexibility also adds complexity that can increase risk if not implemented and managed properly. One of our cybersecurity experts would be happy to discuss whether RBAC or ABAC is the better fit for your requirements.
An Entrust Identity portfolio specialist will be in touch with options soon.
Identity Portfolio
Our Identity Portfolio Capabilities
Authenticate
Streamline the onboarding of diverse users and devices with a wide range of technologies.
Authorize
Ensure both strong security and exceptional user experiences with these best-in-class technologies.
Transact and Manage
Continuously protect against advanced threats with technology from behavior analytics to fraud detection.
Entrust Identity Use Cases
Consumer
Consumer Banking
Attract and retain customers with best-in-class mobile and online banking services.
Customer Portals
Give customers frictionless access to your portals — and build a great brand experience.
CIAM Integration
Our portfolio integrates seamlessly with your customer identity and access management (CIAM) strategies.
Meet PSD2 Regulations
We have the trusted identity tools you need to help you be successful and in compliance.
Workforce
Physical/Logical Access
Our portfolio offers the necessary technologies to integrate physical and logical secure access.
Privileged Worker
Protect the critical application credentials of system administrators or senior leaders.
Passwordless Login
Get a passwordless SSO solution that supports all devices, PCs and Macs, and cloud and on-premises apps.
Enable PIV Compliant Government Mobility
Remove complexity and enable highly secure mobility with proven PIV solutions.
Citizen
Digital Citizen
Use our portfolio to secure and manage passports, national IDs, and driver's licenses.