Documentacao renderizada
Esta pagina renderiza o Markdown e Mermaid do modulo diretamente da fonte publica de documentacao.
Overview#
The Role-Based Access Control (RBAC) module delivers authorization management for complex organizations, supporting hierarchical role structures with inheritance, delegation, and audit compliance. Through role composition, dynamic permission evaluation, and visual hierarchy management, RBAC enforces least-privilege security principles while simplifying access administration across your deployment.
Key Features#
-
Role Hierarchy and Inheritance - Define roles in a parent-child hierarchy where child roles automatically inherit parent permissions. Additive inheritance, permission overrides, and multiple inheritance support complex organizational structures. Visual hierarchy tools show permission flow and impact analysis for role changes.
-
Role Types - Support for functional roles (job-based), organizational roles (department/hierarchy-based), administrative roles (system management), service roles (non-human accounts), and temporary roles (time-bound elevated access). Each type is purpose-built for its use case with appropriate defaults and constraints.
-
Role Composition and Groups - Bundle related roles into groups for team-based assignment. Dynamic role assignment automatically provisions access based on user attributes such as department, job title, location, or employment type, reducing manual administration.
-
Conditional and Context-Based Roles - Activate roles based on context including on-call schedules, business hours, project membership, or geographic location. Permissions adapt dynamically to the situation without manual intervention.
-
Permission Management - Granular permissions across applications, resources, and operations with support for resource-level, field-level, and operation-level access control. Wildcard patterns, permission scoping, and deny rules provide precise control over what each role can access.
-
Delegation and Temporary Elevation - Structured workflows for temporary privilege elevation with automatic expiration, approval chains, and complete audit trails. Support for break-glass emergency access, incident response roles, and time-limited project assignments.
-
Separation of Duties - Define mutually exclusive role combinations and enforce segregation policies to prevent conflicts of interest. The system detects and prevents violations during role assignment.
-
Access Reviews and Certification - Automated periodic access reviews with manager certification, unused access detection, and over-privilege identification. Review campaigns track completion rates and generate compliance-ready documentation.
-
Audit and Compliance - Complete audit trails for every role assignment, permission change, access decision, and delegation event. Pre-built reports support SOC 2, HIPAA, PCI DSS, and ISO 27001 access control requirements.
Use Cases#
- Enterprise access governance with hierarchical roles that mirror organizational structure, enabling consistent access management across thousands of users and hundreds of resources.
- Regulatory compliance through automated access reviews, separation of duties enforcement, and audit-ready documentation for SOC 2, HIPAA, PCI DSS, and SOX.
- Temporary and project-based access using time-bound roles with automatic expiration, ensuring contractors, auditors, and project teams have access only when needed.
- Multi-tenant isolation where each tenant manages its own role hierarchy independently, with platform-level controls ensuring proper boundaries between organizations.
- Least-privilege enforcement through dynamic role assignment, regular access reviews, and automated detection of over-privileged accounts.
Getting Started#
- Map Your Organization - Document your organizational structure, departments, and job functions to inform role design.
- Design Role Hierarchy - Create your role tree with appropriate inheritance relationships and permission assignments.
- Configure Policies - Set up separation of duties rules, delegation constraints, and access review schedules.
- Assign Roles - Provision initial role assignments and configure dynamic assignment rules based on user attributes.
- Schedule Reviews - Establish regular access certification campaigns to maintain least-privilege posture.
Availability#
- Enterprise Plan: Included (full hierarchy, delegation, separation of duties, access reviews, advanced audit)
- Professional Plan: Core RBAC included; delegation workflows, conditional roles, and access certification available as add-on
Last Reviewed: 2026-02-05