- 27 Jun 2024
- 2 Minutes to read
- Print
- PDF
Overview
- Updated on 27 Jun 2024
- 2 Minutes to read
- Print
- PDF
Empowering Access, Ensuring Security!
Access Control Center (ACC) ensures that users have the appropriate level of access to resources, systems, or data within the Application.
At the platform layer below are the components of ACC:
Refer to the illustration for more information about the process flow involved in Access Control Center.
It starts with authentication to verify user identities, assigns roles or permissions based on job functions, often using role templates as standardized sets of access rights, and ultimately ensures that users can access what they need while maintaining security and compliance.
Refer to the table for more details on steppers involved in Access Control Center.
Sl no. | Name | Definition |
---|---|---|
1 | Authentication | Authentication is the process of verifying the identity of a user, device, or system to ensure that they are who they claim to be. This verification is typically based on something the user knows (such as a password or PIN), something the user has (such as a security token or smart card), or something the user is (such as biometric characteristics like fingerprints or iris scans). |
2 | Roles | Roles represent a collection of permissions (Role Templates) that dictate what actions a user can perform within the system. |
3 | Role Template | Role Templates help define defined sets of access rights and permissions within a system. This typically includes identifying the various roles or job functions within the organization, determining the specific actions or tasks each role requires, and defining the level of access needed for each task. For instance, an Application Designers role template needs creation access to Form Designers, Workflow Designers, and Business Rule Designers. They should not have access to consumer forms like My Incidents or End User Service Portals. Conversely, an End User role template should not access designer screens but can access My Incidents and the End User Service Portal. |
4 | Role Mapping | Role Mapping ensures users have appropriate access to rights and permissions based on their roles and responsibilities. |
5 | User | Users are individuals who engage with the platform to execute tasks and access resources. They encompass employees, customers, partners, or any entity necessitating access to digital resources. They are typically authenticated within the system and assigned specific roles and permissions that dictate their level of access to functionalities and data. |
6 | Customer | An individual who consumes or interacts with IT services provided by an IT service provider. Customers in ITSM can include internal users within the organization, such as employees or departments, as well as external clients, partners, or stakeholders |
Having seen the capabilities of Access Control Center, let us start configuring the steppers used to control and manage user access to resources.
Authentication | Roles | Role Template | Role Mapping | User |
Customer |