Overview
  • 27 Jun 2024
  • 2 Minutes to read
  • PDF

Overview

  • PDF

Article summary

Empowering Access, Ensuring Security!

Access Control Center (ACC) ensures that users have the appropriate level of access to resources, systems, or data within the Application.  

At the platform layer below are the components of ACC: 

Refer to the illustration for more information about the process flow involved in Access Control Center.

It starts with authentication to verify user identities, assigns roles or permissions based on job functions, often using role templates as standardized sets of access rights, and ultimately ensures that users can access what they need while maintaining security and compliance.

Refer to the table for more details on steppers involved in Access Control Center.

Sl no.Name Definition
1

Authentication

Authentication is the process of verifying the identity of a user, device, or system to ensure that they are who they claim to be. This verification is typically based on something the user knows (such as a password or PIN), something the user has (such as a security token or smart card), or something the user is (such as biometric characteristics like fingerprints or iris scans).

2

Roles

Roles represent a collection of permissions (Role Templates) that dictate what actions a user can perform within the system.
3Role Template

Role Templates help define defined sets of access rights and permissions within a system. This typically includes identifying the various roles or job functions within the organization, determining the specific actions or tasks each role requires, and defining the level of access needed for each task.

For instance, an Application Designers role template needs creation access to Form Designers, Workflow Designers, and Business Rule Designers. They should not have access to consumer forms like My Incidents or End User Service Portals.  Conversely, an End User role template should not access designer screens but can access My Incidents and the End User Service Portal.

4Role MappingRole Mapping ensures users have appropriate access to rights and permissions based on their roles and responsibilities.
5UserUsers are individuals who engage with the platform to execute tasks and access resources. They encompass employees, customers, partners, or any entity necessitating access to digital resources. They are typically authenticated within the system and assigned specific roles and permissions that dictate their level of access to functionalities and data.
6CustomerAn individual who consumes or interacts with IT services provided by an IT service provider. Customers in ITSM can include internal users within the organization, such as employees or departments, as well as external clients, partners, or stakeholders

Having seen the capabilities of Access Control Center, let us start configuring the steppers used to control and manage user access to resources.

AuthenticationRolesRole TemplateRole MappingUser

Customer

Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.