{"id":37142,"date":"2021-07-06T13:26:41","date_gmt":"2021-07-06T12:26:41","guid":{"rendered":"https:\/\/www.firstware.com\/?page_id=37142"},"modified":"2024-06-12T09:41:56","modified_gmt":"2024-06-12T08:41:56","slug":"authorization","status":"publish","type":"page","link":"https:\/\/www.firstware.com\/en\/authorization\/","title":{"rendered":"Authorization"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;10561&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]\n<h1>Authorization<\/h1>\n<h2 style=\"margin-top: 0;\">Secure management of access authorizations<\/h2>\n<p>High security and control over employee access:<\/p>\n<p>Automate key tasks and meet regulatory requirements.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; top_margin=&#8221;30&#8243; bottom_margin=&#8221;0&#8243;][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;whitetext&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-users&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:https%3A%2F%2Fwww.firstware.com%2Fen%2Fauthorization%2Faccess-management%2F&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"https:\/\/firstware.com\/en\/authorization\/access-management\/\">Access Management<\/a><\/p>\n[\/vc_column_text][vc_column_text]\n<p>Manage permission groups, department groups, and<\/p>\n<p>email distribution lists in one efficient portal.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;far fa-check-square&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:https%3A%2F%2Fwww.firstware.com%2Fen%2Fauthorization%2Fapproval-workflow%2F&#8221;][vc_column_text el_class=&#8221;menu_icon&#8221;]\n<p><a class=\"menuicon\" href=\"#approvals\">Approvals<\/a><\/p>\n[\/vc_column_text][vc_column_text]\n<p>Add one or more decision makers to review requests and approve or decline access on a point-in-time basis.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;far fa-hand-point-right&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"https:\/\/firstware.com\/en\/authorization\/approval-workflow\/\">Roles<\/a><\/p>\n[\/vc_column_text][vc_column_text]\n<p>Define flexible roles<br \/>\nfor your employees, that precisely and reliably regulate access authorizations.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-sync&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:https%3A%2F%2Fwww.firstware.com%2Fen%2Fauthorization%2Fautomation%2F|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"https:\/\/firstware.com\/en\/authorization\/automation\/\">Automation<\/a><\/p>\n[\/vc_column_text][vc_column_text]\n<p>Automate repetitive work processes by scheduling a variety of tasks and letting them run automatically.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#eff5ff&#8221;][vc_column][vc_column_text]\n<h2>What is Authorization Management?<\/h2>\n<p class=\"absatz\"><strong>Authorization Management<\/strong>, also Access Management, is about the <strong>secure provision of resources and access rights<br \/>\n<\/strong>for all employees of a company.<\/p>\n<p class=\"absatz\"><strong>With the support of Authorization Management, employees only receive the authorizations they really need.<br \/>\n<\/strong>Also in case of change of department, new areas of responsibility or after leaving the company, all access rights must be<br \/>\nbe updated immediately. Otherwise, security gaps arise that make internal and external attacks possible.<\/p>\n<p class=\"absatz\"><span style=\"font-weight: 400;\"><strong>An <a href=\"https:\/\/firstware.com\/en\/\" target=\"_blank\" rel=\"noopener\">IAM system<\/a>, such as FirstWare IDM-Portal, <\/strong> makes companies define their access rights<br \/>\nand determine who has access to data and other resources and under what conditions.<br \/>\nIt contributes significantly to the <strong>adherence to legal regulations and <a href=\"https:\/\/firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\">compliance<\/a> guidelines<\/strong>.<\/span><\/p>\n<p class=\"absatz\">Authorization Management is an essential component of <strong><a href=\"https:\/\/firstware.com\/en\/identity-management\/\" target=\"_blank\" rel=\"noopener\">Identity Management<\/a><\/strong>.<br \/>\n<strong>Identity &amp; Access Management (short: IAM) is the core function of the FirstWare IDM-Portal.<\/strong><\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\"><button class=\"ButtonBeratung2 aligncenter\">Contact us now<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#ffffff&#8221; el_id=&#8221;accessmanagement&#8221;][vc_column][vc_column_text]\n<h2>Authorization Management with FirstWare IDM-Portal<\/h2>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Access management<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">With FirstWare IDM-Portal, you can easily assign permissions thanks to secure and user-friendly interfaces.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Create <strong>department and permission groups<\/strong> and give them access to relevant resources, e.g. file folders. This way, all members of a group automatically have access. Individual customization for individual employees is no longer necessary.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Put the maintenance of <strong>e-mail distribution groups<\/strong> in the hands of the employees who own the distribution group.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/authorization\/access-management\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Manage access rights<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:85px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221;]\n<p><a href=\"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\"><img decoding=\"async\" class=\"imgshadow wp-image-45350 aligncenter\" title=\"\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg\" alt=\"\" width=\"508\" height=\"234\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg 3000w, https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2-300x138.jpg 300w, https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2-1024x472.jpg 1024w, https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2-768x354.jpg 768w, https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2-1536x708.jpg 1536w, https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2-2048x943.jpg 2048w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#eff5ff&#8221; el_id=&#8221;approvals&#8221; top_margin=&#8221;20&#8243; css=&#8221;.vc_custom_1636974191416{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:80px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-40323 size-full\" title=\"Authorization - Approval workflows \" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/11\/Approval-Workflow-600x360-1.png\" alt=\"Authorization - Approval workflows \" width=\"600\" height=\"360\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/11\/Approval-Workflow-600x360-1.png 600w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/11\/Approval-Workflow-600x360-1-300x180.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Approval workflows<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">As soon as you place Identity &amp; Access Management tasks in the hands of non-IT departments, you can set up security levels.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">These approval workflows ensure that<\/p>\n<ul style=\"text-align: left;\">\n<li><strong>group memberships are only granted to authorized persons,<\/strong><\/li>\n<li><strong>data<\/strong>\u00a0<strong>changes<\/strong> are made appropriately.<\/li>\n<\/ul>\n<p class=\"absatz\" style=\"text-align: left;\">If a specialist department requests memberships in <strong>sensitive groups<\/strong>, the IT, as the deciding authority, can approve or reject.<br \/>\nIt is also possible to involve several decision-makers from different departments in <strong>multi-level approval processes<\/strong>.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/authorization\/approval-workflow\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Integrate approvals<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1636973983344{padding-top: 25px !important;}&#8221; el_id=&#8221;roles&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Role-based permissions<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">By setting up roles in IDM-Portal, <strong>authorizations can be tailored precisely<\/strong>. As a result, each employee can only see and edit what he or she needs to work with.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Your employees receive individual, reduced and fast overviews. Assigning authorizations provides additional security to the IT and other departments.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\"><strong>Role Based Access Control (RBAC) is a core feature of FirstWare IDM-Portal.<\/strong><\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/authorization\/role-based-access-control\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Use RBAC<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:60px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-12553 size-full\" title=\"Authorization - Role-based permissions\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2019\/06\/Zugriffsberechtigung-write-read-hide-special-access-1.png\" alt=\"Authorization - Role-based permissions\" width=\"638\" height=\"366\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/Zugriffsberechtigung-write-read-hide-special-access-1.png 638w, https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/Zugriffsberechtigung-write-read-hide-special-access-1-300x172.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#eff5ff&#8221; css=&#8221;.vc_custom_1636974199979{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:100px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-12822\" title=\"Authorization - Single sign-on\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2019\/06\/Single-Sign-On-1.png\" alt=\"Authorization - Single sign-on\" width=\"400\" height=\"242\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/Single-Sign-On-1.png 505w, https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/Single-Sign-On-1-300x181.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Single sign-on<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Single sign-on (SSO) <strong>simplifies and speeds up work<\/strong> by allowing users to open all applications<strong> with a single password<\/strong>.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\"><strong>Action-based single sign-on<\/strong> means performing actions in other applications directly with IDM-Portal. <strong>Using PowerShell in the back end<\/strong>, you control third-party systems based on roles &#8211; automatically.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Access many applications by logging in with IDM-Portal only once.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/authorization\/single-sign-on\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Deploy action-based SSO<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1636974011119{padding-top: 30px !important;}&#8221; el_id=&#8221;automation&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Automation<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">IAM Automation speeds up many steps in Identity &amp; Authorization Management and reduces manual errors.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Automation features include:<\/p>\n<ul>\n<li><strong>automatic filling of input fields<\/strong><\/li>\n<li><strong>automatic password generation<\/strong><\/li>\n<li><strong>approval workflows<\/strong><\/li>\n<li><strong>time control<\/strong><\/li>\n<\/ul>\n<p class=\"absatz\" style=\"text-align: left;\">Data inputs cause immediately visible changes and perform important actions in the background.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">In addition, the implementation of data changes and approvals can be <strong>time-controlled, i.e. immediately or at a specific time<\/strong>.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/authorization\/automation\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Automate work processes<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:100px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221;]\n<p><img decoding=\"async\" class=\"imgshadow alignnone wp-image-45352\" title=\"Authorization - Automation\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Automation_EN.png\" alt=\"\" width=\"454\" height=\"445\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Automation_EN.png 676w, https:\/\/www.firstware.com\/wp-content\/uploads\/2024\/06\/Automation_EN-300x294.png 300w\" sizes=\"(max-width: 454px) 100vw, 454px\" \/><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1636974024746{padding-top: 25px !important;}&#8221; background_color=&#8221;#f4f4f4&#8243;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1628150000314{margin-top: 20px !important;margin-bottom: 20px !important;}&#8221;][vc_single_image image=&#8221;36703&#8243; img_size=&#8221;454&#215;378.23&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1628150603663{margin-top: 25px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1629202195141{margin-top: -25px !important;}&#8221;]<!-- Abschnitt 5 --><\/p>\n<h2>Authorization Management<\/h2>\n<p><strong>As optimized as you want.<\/strong><\/p>\n<p class=\"absatz\"><strong>As detailed as you need.<\/strong><\/p>\n<ul class=\"featureList aligncenter\">\n<li class=\"tick\">Authorization management from a group and user perspective<\/li>\n<li class=\"tick\">Time-controlled approval workflows<\/li>\n<li class=\"tick\">Role-based access permissions<\/li>\n<li class=\"tick\">One-time logon, instant access<\/li>\n<li class=\"tick\">Automated workflows<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\"><button class=\"ButtonBeratung aligncenter\">Inquire now<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;-60&#8243; background_color=&#8221;#ffffff&#8221;][vc_column][vc_column_text]\n<h2>Contact<\/h2>\n<p class=\"absatz\">You can reach us at<\/p>\n<p class=\"absatz\" style=\"color: #003a93; font-size: 1.2em; font-style: 800;\"><a href=\"tel:+4981969984330\">+49 81 969 984 330<\/a><\/p>\n<p class=\"absatz\">or via our<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\"><button class=\"ButtonBeratung aligncenter\">Contact form<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;10561&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-37142","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Authorization - FirstWare IDM-Portal - High security through access rights<\/title>\n<meta name=\"description\" content=\"Authorization Management with the FirstWare IDM Portal | Authorizations, Approval Workflows, Role-based Access, SSO and IAM Automation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstware.com\/en\/authorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authorization - FirstWare IDM-Portal - High security through access rights\" \/>\n<meta property=\"og:description\" content=\"Authorization Management with the FirstWare IDM Portal | Authorizations, Approval Workflows, Role-based Access, SSO and IAM Automation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstware.com\/en\/authorization\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstWare IDM-Portal\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/\",\"name\":\"Authorization - FirstWare IDM-Portal - High security through access rights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Access-Management-2.jpg\",\"description\":\"Authorization Management with the FirstWare IDM Portal | Authorizations, Approval Workflows, Role-based Access, SSO and IAM Automation\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Access-Management-2.jpg\",\"contentUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Access-Management-2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authorization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"name\":\"FirstWare IDM-Portal\",\"description\":\"Identity and Autorization Management in M365 and Active Directory\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\",\"name\":\"FirstWare IDM-Portal\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"contentUrl\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"width\":1,\"height\":1,\"caption\":\"FirstWare IDM-Portal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Authorization - FirstWare IDM-Portal - High security through access rights","description":"Authorization Management with the FirstWare IDM Portal | Authorizations, Approval Workflows, Role-based Access, SSO and IAM Automation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstware.com\/en\/authorization\/","og_locale":"en_US","og_type":"article","og_title":"Authorization - FirstWare IDM-Portal - High security through access rights","og_description":"Authorization Management with the FirstWare IDM Portal | Authorizations, Approval Workflows, Role-based Access, SSO and IAM Automation","og_url":"https:\/\/www.firstware.com\/en\/authorization\/","og_site_name":"FirstWare IDM-Portal","og_image":[{"url":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstware.com\/en\/authorization\/","url":"https:\/\/www.firstware.com\/en\/authorization\/","name":"Authorization - FirstWare IDM-Portal - High security through access rights","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/#primaryimage"},"image":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg","description":"Authorization Management with the FirstWare IDM Portal | Authorizations, Approval Workflows, Role-based Access, SSO and IAM Automation","breadcrumb":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstware.com\/en\/authorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/authorization\/#primaryimage","url":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg","contentUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/06\/Access-Management-2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstware.com\/en\/authorization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstware.com\/en\/"},{"@type":"ListItem","position":2,"name":"Authorization"}]},{"@type":"WebSite","@id":"https:\/\/www.firstware.com\/en\/#website","url":"https:\/\/www.firstware.com\/en\/","name":"FirstWare IDM-Portal","description":"Identity and Autorization Management in M365 and Active Directory","publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstware.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstware.com\/en\/#organization","name":"FirstWare IDM-Portal","url":"https:\/\/www.firstware.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","contentUrl":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","width":1,"height":1,"caption":"FirstWare IDM-Portal"},"image":{"@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/37142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/comments?post=37142"}],"version-history":[{"count":0,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/37142\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/media?parent=37142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}