Definition of Policy Group: Define user groups categorized by department, project, and role, and set appropriate access policies for each group.
How to set up a policy group: Create policies according to the security requirements of each group and assign user permissions to the group for efficient management.
Automatic Permission Assignment: When a user moves within a group (department, project, etc.), permissions are automatically updated according to the configured policy.
For example, when moving from the marketing department to the development department, marketing-related permissions are automatically revoked and development-related permissions are automatically granted.
Create groups for each user policy to be managed in SaaS, create the corresponding policies, and map them to each other.
Create user groups in SaaS services like Microsoft 365 and integrate policies with SHIELD ID.
After setting the access permissions required for the service, it can be centrally managed by mapping it with the SHIELD ID.
If only the IT department requires administrative privileges for a specific SaaS service, map the policy only to that group.
Assign users/groups to policy groups for RBAC permission management.
Create policy groups based on user roles, departments, and projects for centralized management.
When a user is added to a group, they automatically inherit the policies applied to that group and receive appropriate permissions.
Advantages: It is possible to consistently manage large-scale user permissions through policy groups without the need to manage permissions on an individual user basis.
Efficiency: Prevents errors or permission omissions through group policy-based management, eliminating the need for manual updates every time a user changes.
It is possible to manage policies of various SaaS services in an integrated manner through SHIELD ID.
Integrate and manage various SaaS services such as Microsoft 365 and Google Workspace based on SHIELD ID's RBAC.
Set access policies for multiple SaaS services and monitor them through the single management console of SHIELD ID.
Consistently apply different security policies for each SaaS service through SHIELD ID and manage user permissions in an integrated manner.