Overview

Authorization Management

As security compliance receives increasing emphasis, many application systems implement access control, restricting the operations each visitor can perform and the resources they can access within the application.

In this context, if unified authorization only involves granting access accounts to applications, enterprise administrators would still need to log into each application to assign permissions to those accounts. This task is quite cumbersome for enterprise administrators.

To enhance the user experience, we advocate for integrated authorization operations, completing the authorization of application access accounts and their permissions in a single step. This allows administrators to centrally manage employee permissions.

Furthermore, if an enterprise has clear rules for permission assignment, we also support automatically granting account and application permissions to users who meet the specified conditions.

Currently, we support you in unifying the management and authorization of permissions from your enterprise's self-built applications on IDaaS. You can retrieve the permission information granted to users when needed.

For pre-integrated applications, their authorization functionalities need to be studied individually, and support will be gradually added in the future.

Regarding authorization, common RBAC and ACL authorization models are supported. You can select the authorization model through the graphical interface.