Skip to main content

i4connected Knowledge Base

Role management

Abstract

The security model employed by the new role management allows granular and transparent control over user permissions.

The security model is employed by the new role management, which allows granular and transparent control over user permissions across all Hierarchical Entities, Devices, Signals, and other general operations.

As we shall see in the upcoming articles, role management is based on the following concepts: