Your needs
Standards and regulations
Different environments
Reviewing digital identities
Segregation of Duties (SoD)
Role building
Accounts review
Risk management
Kleverware IAG
Mapping existing data
Ongoing monitoring
Role Mining
K-Recertification Manager

Setting up job profiles or roles

In order to manage authorisations, an IS needs to be structured around users and the resources that they use.

Implementing an identity management system based on job profiles has the advantage of:

  • standardising the granting of permissions;
  • facilitating and speeding up the process of granting access to staff and external partners (clients, suppliers, service providers, auditors, etc.);
  • preventing misuse of permissions between users who have incompatible duties;
  • securing the IS;
  • making audits easier;
  • ensuring compliance with regulations (SOX, LSF, Basel 3, Solvency 2).

« Role-Based Access Control » or RBAC is a model in which access to the IS is based on job profiles (or roles).

Each user or group of users is allocated a job profile. This profile (or role) generally follows from the structure of the IS and/or the organisation of the company. Each user is granted specific access permissions according to their profile.

Users who carry out similar duties are grouped together under the same role. This simplifies not only technical access management, but also gives businesses the possibility of describing and specifying authorisations. As a result, the IS is more secure, costs are reduced and permissions are granted more easily and quickly. The life cycle of staff within the company or organisation (new recruits, promotions, changing roles and departures) is also better managed.

Formation © Kleverware

The answer with Kleverware IAG :

► Mapping existing data
► Role Mining

Top of page
Copyright Kleverware 2005 - 2018 - All rights reserved.