Skip to main content

RBAC(Role-Based Access Control)

RBAC permission management through policy groups

  • Definition of Policy Group: Define user groups categorized by department, project, and role, and set appropriate access policies for each group.
  • How to set up a policy group: Create policies according to the security requirements of each group and assign user permissions to the group for efficient management.
  • Automatic Permission Assignment: When a user moves within a group (department, project, etc.), permissions are automatically updated according to the configured policy.
    • For example, when moving from the marketing department to the development department, marketing-related permissions are automatically revoked and development-related permissions are automatically granted.

Create groups for each user policy to be managed in SaaS, create the corresponding policies, and map them to each other.

  • Create user groups in SaaS services like Microsoft 365 and integrate policies with SHIELD ID.
  • After setting the access permissions required for the service, it can be centrally managed by mapping it with the SHIELD ID.
  • If only the IT department requires administrative privileges for a specific SaaS service, map the policy only to that group.

Assign users/groups to policy groups for RBAC permission management.

  • Create policy groups based on user roles, departments, and projects for centralized management.
  • When a user is added to a group, they automatically inherit the policies applied to that group and receive appropriate permissions.
  • Advantages: It is possible to consistently manage large-scale user permissions through policy groups without the need to manage permissions on an individual user basis.
  • Efficiency: Prevents errors or permission omissions through group policy-based management, eliminating the need for manual updates every time a user changes.

It is possible to manage policies of various SaaS services in an integrated manner through SHIELD ID.

  • Integrate and manage various SaaS services such as Microsoft 365 and Google Workspace based on SHIELD ID's RBAC.
  • Set access policies for multiple SaaS services and monitor them through the single management console of SHIELD ID.
  • Consistently apply different security policies for each SaaS service through SHIELD ID and manage user permissions in an integrated manner.