i4connected Knowledgebase 5.6

Role management

Abstract

The security model employed by the new role management allows granular and transparent control over the user permissions.

The security model is employed by the new role management, which allows a granular and transparent control over the user permissions across all Hierarchical Entities, Devices, Signals and other general operations.

As we shall see in the upcoming articles, the role management is based on the following concepts: