i4connected Knowledgebase 5.6

Role management

Abstract

The security model employed by the new role management allows granular and transparent control over the user permissions.

The security model is employed by the new role management, which allows granular and transparent control over the user permissions across all Hierarchical Entities, Devices, Signals, and other general operations.

As we shall see in the upcoming articles, role management is based on the following concepts: