{"id":38757,"date":"2021-07-09T10:42:21","date_gmt":"2021-07-09T09:42:21","guid":{"rendered":"https:\/\/www.firstware.com\/?page_id=38757"},"modified":"2024-06-12T09:58:10","modified_gmt":"2024-06-12T08:58:10","slug":"role-based-access-control","status":"publish","type":"page","link":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/","title":{"rendered":"Role-based access"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;12570&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1506437070493{margin-top: -20px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1630415182957{padding-top: 15px !important;}&#8221; el_class=&#8221;p&#8221;]\n<h1 class=\"exc-header\">Role-based access control<\/h1>\n<h2 style=\"margin-top: 0;\">Control access to your data<\/h2>\n<p>Involve business departments without security risks:<\/p>\n<p>Role-based access authorizations even for non-IT employees.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1596464679864{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-universal-access&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23accessmanagement&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"#accessmanagement\">Access management<\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-key&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23accessrights&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"#accessrights\">Access rights<\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-check-circle&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23approvals&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"#approvals\">Approvals<\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;rgba(97,139,212,0.1)&#8221;][vc_column][vc_column_text]\n<h2>The user perspective<\/h2>\n<p>As an employee or manager of a business department, you have other requirements than IT.<\/p>\n<p class=\"absatz\"><strong>You want to complete your tasks with the appropriate permissions.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-38764\" title=\"User perpective: Role based access (RBAC)\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png\" alt=\"\" width=\"690\" height=\"220\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png 1713w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access-300x95.png 300w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access-1024x326.png 1024w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access-768x244.png 768w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access-1536x489.png 1536w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p class=\"absatz\">Employees and managers <span style=\"color: #333399;\"><strong>want to<\/strong><\/span>:<\/p>\n<p class=\"absatz2\"><i class=\"fa fa-user FA-midblue\"><!--icon--><\/i>see only relevant data<\/p>\n<p class=\"absatz2\"><i class=\"fa fa-user FA-midblue\"><!--icon--><\/i>work independently and individually<\/p>\n<p><i class=\"fa fa-user FA-midblue\"><!--icon--><\/i>do their jobs efficiently<\/p>\n<p>&nbsp;<\/p>\n<p>With IDM-Portal, data and access are organized individually. Users do not need any in-depth IT knowledge.<\/p>\n<p>Appropriate IAM roles are defined and configured in advance.<\/p>\n<p><a href=\"https:\/\/firstware.com\/en\/user-driven-identity-management\/\" target=\"_blank\" rel=\"noopener\">Identity management for users<\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1627975729873{margin-bottom: 60px !important;}&#8221;][vc_column][vc_column_text]\n<h2>The RBAC solution<\/h2>\n<h3>Define authorizations and functions in roles<\/h3>\n<p>Via FirstWare IDM-Portal, an individually tailored authorization concept is created.<\/p>\n<p class=\"absatz\">This takes into account the tasks, resources and groups of people in the respective company.<\/p>\n<p class=\"absatz\"><strong>It specifies exactly what access the IDM roles have to the portal.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-38770 size-full\" title=\"RBAC Role-based access\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/The-RBAC-solution-826x204-1.png\" alt=\"RBAC Role-based access\" width=\"826\" height=\"204\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/The-RBAC-solution-826x204-1.png 826w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/The-RBAC-solution-826x204-1-300x74.png 300w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/The-RBAC-solution-826x204-1-768x190.png 768w\" sizes=\"(max-width: 826px) 100vw, 826px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Rather, it defines the rights to access data in the various identity poviders (e.g., Active Directory, Entra ID).<\/p>\n<p class=\"absatz\">Different departments access data of the same employee, while seeing and managing different data.<\/p>\n<p class=\"absatz\">In practice, <strong>user-friendliness and fast access<\/strong>\u00a0are the key factors for success.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\"><button class=\"ButtonBeratung2 aligncenter\">Define roles together<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;10586&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;-50&#8243; bottom_margin=&#8221;-40&#8243; css=&#8221;.vc_custom_1628147580378{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column_text]\n<h2>Main features &#8211; Role-based access control<\/h2>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1630320369066{padding-top: -20px !important;}&#8221; el_id=&#8221;accessmanagement&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\">RBAC &#8211; Organize role-based access management<\/h3>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p class=\"absatz\" style=\"text-align: left;\">FirstWare IDM-Portal provides you with a <strong>solution with flexible roles for Role Based Access Control (RBAC)<\/strong>.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">You define the roles and associated permissions. Employees use them for updates in IDM-Portal&#8217;s <a href=\"https:\/\/firstware.com\/en\/identity-management\/self-service\/\" target=\"_blank\" rel=\"noopener\">Self Service<\/a> view.<\/p>\n<p class=\"paragraph\" style=\"text-align: left;\">In business departments, <a href=\"https:\/\/firstware.com\/en\/identity-management\/user-management\/\">colleagues take over various tasks<\/a> &#8211; without companies losing control over security.<\/p>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:30px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><img decoding=\"async\" class=\"alignnone wp-image-38773\" title=\"Role-based access - RBAC for different roles\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/RBAC-Organize-role-based-access-management-697x484-1.png\" alt=\"Role-based access - RBAC for different roles\" width=\"450\" height=\"312\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/RBAC-Organize-role-based-access-management-697x484-1.png 697w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/RBAC-Organize-role-based-access-management-697x484-1-300x208.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_id=&#8221;accessrights&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:70px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-12554 size-full\" title=\"Role-based access - Access rights and role-based automation\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2019\/06\/Zugriffsberechtigung-write-read-hide-special-access-1.png\" alt=\"Role-based access - Access rights and role-based automation\" width=\"638\" height=\"366\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/Zugriffsberechtigung-write-read-hide-special-access-1.png 638w, https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/Zugriffsberechtigung-write-read-hide-special-access-1-300x172.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\">Access rights and role-based automation<\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">With the help of IDM-Portal, you can define <strong>customized access rights<\/strong>, such as &#8220;read and write&#8221;. In addition, constellations such as &#8220;may write but not read&#8221; are also possible.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">These permissions apply to both:<\/p>\n<ul>\n<li style=\"text-align: left;\">certain properties\/attributes of employees,<\/li>\n<li style=\"text-align: left;\">as well as to permissions of resources.<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><strong>Views can be designed depending on the role &#8211; just like <a href=\"https:\/\/firstware.com\/en\/authorization\/automation\/\" target=\"_blank\" rel=\"noopener noreferrer\">automated actions<\/a>.<\/strong><\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221; el_id=&#8221;approvals&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\">Approval of authorizations<\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Assigning permissions can also cost the IT department a lot of time. Allow non-IT staff to perform role-based <a href=\"https:\/\/firstware.com\/en\/authorization\/approval-workflow\/\" target=\"_blank\" rel=\"noopener noreferrer\">approvals.<\/a><\/p>\n<p class=\"absatz\" style=\"text-align: left;\"><strong>Role Based Access Control (RBAC)<\/strong> can go well beyond controlling individual actions:<\/p>\n<ul>\n<li style=\"text-align: left;\">What attributes may be edited?<\/li>\n<li style=\"text-align: left;\">Which functions are activated?<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/firstware.com\/en\/authorization\/automation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Which tasks can be automated?<\/a><\/li>\n<\/ul>\n<p style=\"text-align: left;\"><strong>You define the scope of the roles &#8211; we support you with best practice experience.<\/strong><\/p>\n<p>&nbsp;<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:120px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-12431\" title=\"Role-based access - IAM automation\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Automation.png\" alt=\"Role-based access - IAM automation\" width=\"180\" height=\"180\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Automation.png 312w, https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Automation-150x150.png 150w, https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Automation-300x300.png 300w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/><\/p>\n<p>&nbsp;<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221; css=&#8221;.vc_custom_1627981924208{padding-top: 50px !important;}&#8221;][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;36705&#8243; img_size=&#8221;454&#215;378.23&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1628146854960{margin-top: 25px !important;}&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1630415248923{margin-top: -25px !important;}&#8221; el_class=&#8221;p2&#8243;]<!-- Abschnitt 5 --><\/p>\n<h2>Role-based access control<\/h2>\n<p><strong>As optimized as you want it to be.<\/strong><\/p>\n<p class=\"absatz\"><strong>As smart as you need it to be.<\/strong><\/p>\n<ul class=\"featureList aligncenter\">\n<li class=\"tick\">Different user groups<\/li>\n<li class=\"tick\">Different data views<\/li>\n<li class=\"tick\">High security for permissions<\/li>\n<li class=\"tick\">Work faster through customization<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]<a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Inquire now<\/button><\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; bottom_margin=&#8221;0&#8243; background_color=&#8221;#3d4045&#8243; el_class=&#8221;whitetext&#8221;][vc_column el_class=&#8221;whitetext&#8221;][vc_column_text]\n<p><!-- Abschnitt 6 --><\/p>\n<h2 class=\"whitetext\">The advantages of RBAC<\/h2>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1\/5 vc_col-md-1\/5&#8243;]<div class=\"fa-icon-wrapper aligncenter\"><i class=\"fas fa fa-clock-o fa-icons-firstware\" aria-hidden=\"true\"><\/i><\/div>[vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Time and cost savings<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;][vc_column_text]<img decoding=\"async\" class=\"size-full wp-image-10053 aligncenter\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2017\/10\/fast-orange.png\" alt=\"schnell\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/10\/fast-orange.png 200w, https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/10\/fast-orange-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Accelerated processes<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;]<div class=\"fa-icon-wrapper aligncenter\"><i class=\"fas fa fa-search fa-icons-firstware\" aria-hidden=\"true\"><\/i><\/div>[vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Improved data quality<\/h3>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1\/5 vc_col-md-1\/5&#8243;][vc_column_text]<img decoding=\"async\" class=\"aligncenter size-full wp-image-10322\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Group-orange-clean.png\" alt=\"Gruppen\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2018\/02\/Group-orange-clean.png 200w, https:\/\/www.firstware.com\/wp-content\/uploads\/2018\/02\/Group-orange-clean-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/>[\/vc_column_text][vc_column_text]\n<h3 class=\"whitetext\">Easy assignment<br \/>\nof rights<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;][vc_column_text]<img decoding=\"async\" class=\"size-full wp-image-10056 aligncenter\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2017\/10\/kaffee-orange.png\" alt=\"Kaffee-Entlastung\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/10\/kaffee-orange.png 200w, https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/10\/kaffee-orange-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Relief from<br \/>\nroutine tasks<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;][vc_column_text el_class=&#8221;aligncenter&#8221;]<img decoding=\"async\" class=\"alignnone wp-image-10126 size-full\" title=\"Rollen\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2017\/12\/trafficlight-2.png\" alt=\"Rollen Ampel\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/12\/trafficlight-2.png 200w, https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/12\/trafficlight-2-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Controlled access thanks to RBAC<\/h3>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1628147451316{border-radius: 20px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:40px;\"><\/div><\/div>[vc_column_text]\n<p><img decoding=\"async\" class=\"aligncenter wp-image-36713 size-medium\" title=\"IAM expert\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1-300x300.png\" alt=\"IAM expert\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1-300x300.png 300w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1-150x150.png 150w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1.png 484w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text el_class=&#8221;p&#8221;]\n<h2>Tip from the expert<\/h2>\n<p style=\"text-align: center;\">Take time to plan roles and get best practice knowledge from an <a href=\"https:\/\/firstware.com\/en\/about-us\/\" target=\"_blank\" rel=\"noopener\">experienced team<\/a>.<br \/>\nFirstWare IDM-Portal provides very flexible and comprehensive options.<br \/>\nThe solution is as successful as it is designed to be.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;-60&#8243; background_color=&#8221;rgba(97,139,212,0.1)&#8221;][vc_column][vc_column_text]\n<h2>Contact<\/h2>\n<p class=\"absatz\">You reach us at<\/p>\n<p class=\"absatz\" style=\"color: #003a93; font-size: 1.2em; font-style: 800;\"><a href=\"tel:+4981969984330\">+49 81 969 984 330<\/a><\/p>\n<p class=\"absatz\">or via our<\/p>\n[\/vc_column_text][vc_column_text]<a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Contact form<\/button><\/a>[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;12570&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":37142,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-38757","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Role-based access - FirstWare IDM-Portal Custom-fit roles &amp; access rights<\/title>\n<meta name=\"description\" content=\"Security through role-based access | Custom-fit roles and access rights | Fast processes + high user acceptance through RBAC with user orientation \ud83d\udc68\ud83d\udc77\ud83d\udc81\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Role-based access - FirstWare IDM-Portal Custom-fit roles &amp; access rights\" \/>\n<meta property=\"og:description\" content=\"Security through role-based access | Custom-fit roles and access rights | Fast processes + high user acceptance through RBAC with user orientation \ud83d\udc68\ud83d\udc77\ud83d\udc81\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstWare IDM-Portal\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/\",\"name\":\"Role-based access - FirstWare IDM-Portal Custom-fit roles & access rights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Role-based-access.png\",\"description\":\"Security through role-based access | Custom-fit roles and access rights | Fast processes + high user acceptance through RBAC with user orientation \ud83d\udc68\ud83d\udc77\ud83d\udc81\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Role-based-access.png\",\"contentUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Role-based-access.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/role-based-access-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authorization\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Role-based access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"name\":\"FirstWare IDM-Portal\",\"description\":\"Identity and Autorization Management in M365 and Active Directory\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\",\"name\":\"FirstWare IDM-Portal\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"contentUrl\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"width\":1,\"height\":1,\"caption\":\"FirstWare IDM-Portal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Role-based access - FirstWare IDM-Portal Custom-fit roles & access rights","description":"Security through role-based access | Custom-fit roles and access rights | Fast processes + high user acceptance through RBAC with user orientation \ud83d\udc68\ud83d\udc77\ud83d\udc81","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Role-based access - FirstWare IDM-Portal Custom-fit roles & access rights","og_description":"Security through role-based access | Custom-fit roles and access rights | Fast processes + high user acceptance through RBAC with user orientation \ud83d\udc68\ud83d\udc77\ud83d\udc81","og_url":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/","og_site_name":"FirstWare IDM-Portal","og_image":[{"url":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/","url":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/","name":"Role-based access - FirstWare IDM-Portal Custom-fit roles & access rights","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png","description":"Security through role-based access | Custom-fit roles and access rights | Fast processes + high user acceptance through RBAC with user orientation \ud83d\udc68\ud83d\udc77\ud83d\udc81","breadcrumb":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/#primaryimage","url":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png","contentUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Role-based-access.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstware.com\/en\/authorization\/role-based-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstware.com\/en\/"},{"@type":"ListItem","position":2,"name":"Authorization","item":"https:\/\/www.firstware.com\/en\/authorization\/"},{"@type":"ListItem","position":3,"name":"Role-based access"}]},{"@type":"WebSite","@id":"https:\/\/www.firstware.com\/en\/#website","url":"https:\/\/www.firstware.com\/en\/","name":"FirstWare IDM-Portal","description":"Identity and Autorization Management in M365 and Active Directory","publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstware.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstware.com\/en\/#organization","name":"FirstWare IDM-Portal","url":"https:\/\/www.firstware.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","contentUrl":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","width":1,"height":1,"caption":"FirstWare IDM-Portal"},"image":{"@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/38757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/comments?post=38757"}],"version-history":[{"count":0,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/38757\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/37142"}],"wp:attachment":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/media?parent=38757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}