Control access with Roles
Roles allow security administrators to control access at the functional level rather than at an identity level. Based on a functional role of an identity in the entire organization, a BR Role or IT Role is assigned. The BR Role is defined as a Birthright Role, which is provisioned to an Identity on onboarding. The IT Role is provisioned, as needed. Both Roles can provide access to a few corporate target systems simultaneously.
Bundled into a Role, the entitlements are managed within the boundaries of each specific account created on a resource. And by granting and\or revoking a role, the user manages entitlements, and also manages accounts across corporate resources.
In this section:
- Birthright Roles
- IT Role
Birthright Roles
In the access control with a Birthright Role, the entitlements are provisioned via the Onboarding or Reinstatement workflow. And by the time an Identity becomes Active, they are already equipped with all Accounts. A Birthright Role provisions access in alignment with the condition determined by the IT Manager, and allowing for granular selection of eligible Identities. Moving forward and for the lifetime of the Identity, their birthright access can be audited and adjusted in alignment with the job duties requirements, qualifications or responsibilities. The Role Creation, Update and Deletion provide the needed changes for all existing Identities and across all affected resources.
The available tools that allow IT Managers to grant and\or revoke the Birthright Roles are summarized in the table below and detailed hereinafter.
|
|
Account created |
Account updated |
Account deleted |
|
Permissions bundled into the Role GRANTED on |
Onboarding \ Reinstatement workflows |
Role Creation workflow |
n/a |
|
Role Creation workflow | |||
|
Role Update workflow | |||
|
Identities Update workflow | |||
|
Permissions bundled into the Role REVOKED on |
n/a |
Role Deletion workflow |
Offboarding workflow |
|
CHANGES performed on the Role assignment |
n/a |
Role Update workflow |
n/a |
|
Identities Update workflow |
IT Role
In the access control with an IT Role, the entitlements are provisioned ad hoc: whenever needed and whomever needed. It is a mechanism for implementing role-based access provisioning for manually selected Identities. Being granted, an IT Role can undergo access updates across all affected Identities. Once created and being Active, an Identity is eligible for an IT Role, which if changed, respectively changes entitlements within the accounts of the Identity.
The available tools that allow the IT Manager to grant and\or revoke IT Roles are summarized in the table below and detailed hereinafter.
|
|
Account created |
Account updated |
Account deleted |
|
Permissions bundled into the Role GRANTED on |
PAR workflow |
PAR workflow |
n/a |
|
Role Update workflow | |||
|
Permissions bundled into the Role REVOKED on |
n/a |
Role Deletion workflow |
Account Removal workflow |
|
Offboarding workflow | |||
|
CHANGES performed on the Role assignment |
n/a |
Manage Access workflow |
n/a |
|
Role Update workflow |
