π RBAC and Authorization
SecTrail CM offers a secure and flexible authorization system with enterprise-level Role-Based Access Control (RBAC). Centrally manage all security layers from user management to permission control.
Certificate management is a sensitive operation. Wrong people performing critical operations can lead to security breaches. With RBAC, you ensure that each user has only the permissions appropriate for their role.
- Least Privilege - Users are given only the minimum permissions they need
- Separation of Duties - Critical operations are distributed among different roles
- Defense in Depth - Multi-layered security control is provided
Key Featuresβ
π₯ Flexible User Managementβ
SecTrail CM supports multiple user sources to meet different enterprise needs:
π Active Directory (AD) / LDAP Integrationβ
Use your existing enterprise identity infrastructure:
- Automatic Synchronization - User information is automatically updated
- Group-based Management - Map AD groups directly to roles
- Centralized User Management - User addition/removal is done in AD
π€ Local User Accountsβ
Independent user management:
- For external consultants and temporary users
- Alternative for users without AD access
- Customizable password policies
- Manual user creation and management
π Hybrid Managementβ
You can use both methods simultaneously. For example, employees can log in with AD while external consultants can use local accounts.
π Role-Based Access Control (RBAC)β
Powerful and flexible role management system:
ποΈ Hierarchical Role Structureβ
- System Roles - Immutable predefined roles
- Custom Roles - Create roles specific to your organization
- Role Inheritance - Roles inheriting permissions from each other
π― Granular Permission Controlβ
Separate permission definition for each operation (CRUD + Execute model):
| Permission | Description | Example |
|---|---|---|
| Create | Add new resource | Create new certificate request |
| Read | View information | View certificate details |
| Update | Modify existing resource | Update certificate information |
| Delete | Remove resource | Delete certificate or CA |
| Execute | Trigger operation | Certificate renewal, deployment |
π’ Organization and Group Managementβ
π₯ User Groupsβ
Organize users:
- Department-based - IT, DevOps, Security, Network teams
- Project-based - Teams for specific projects
- Region/Location-based - Istanbul, Ankara, Izmir offices
- Bulk Role Assignment - Automatic role distribution to groups
β‘ Dynamic Membershipβ
Automatic group membership management:
- AD Group Synchronization - Active Directory groups are automatically synchronized
- Rule-based Assignment - Automatic group membership based on user attributes
- Attribute Filtering - Filtering based on attributes like department, title, location
π Detailed Audit and Monitoringβ
Record all authorization operations and meet compliance requirements:
π User Activity Logβ
Monitor all user interactions:
- β Who logged into the system when?
- β What operations were performed?
- β Which resources were accessed?
- β Failed login attempts
- β IP address and user agent information
π Role and Permission Changesβ
Track authorization changes:
- Role Assignment/Removal - Who assigned/removed which role to whom, when?
- Permission Changes - Which permissions were added/removed?
- Group Membership Changes - Complete history of group memberships
- Change Author Information - The person who made each change is recorded
π Compliance Reportsβ
Audit and compliance reports:
- User Access Rights - Report of each user's permissions
- Active/Inactive User List - User analysis by usage status
- Last Login Times - User activity tracking
- Permission Change History - Changes made within a specific date range
- Privileged User Report - List of highly authorized users
π Predefined Rolesβ
SecTrail CM offers ready-made roles for quick setup:
| Role | Description | Basic Permissions | Use Case |
|---|---|---|---|
| π΄ Admin | System administrator with all permissions | β’ All modules: full access β’ User management β’ System settings β’ Role definition | For system administrators and IT leaders |
| π’ API | System user for API access | β’ Certificates: read, execute β’ Integrations: execute β’ API: full access | For automation and integration systems |
These roles meet basic needs. You can create new roles based on your organization's special requirements or customize by cloning existing roles.
πΌ Use Casesβ
π’ Scenario 1: Department-based Accessβ
Situation: IT department manages all certificates while DevOps team only sees and can renew certificates for their own projects.
Solution:
- IT team is assigned the
Certificate Managerrole - A custom
DevOps Certificate Operatorrole is created for DevOps team - Access is restricted with project-based tags
Roles:
βββ IT Team β Certificate Manager (all certificates)
βββ DevOps Team β DevOps Certificate Operator (only tag:project=devops)
β Scenario 2: Approval Mechanismβ
Situation: Junior employees can create certificate requests but cannot deploy certificates to production environment without manager approval.
Solution:
- Juniors get the
Certificate Requesterrole (create, read permissions) - Managers get the
Certificate Approverrole (execute, deploy permissions) - Approval mechanism is set up with workflow system
Workflow:
1. Junior β Creates certificate request (create)
2. Manager β Reviews and approves request (approve)
3. System β Deploys approved certificate (execute)
π¨βπΌ Scenario 3: External Consultant Accessβ
Situation: Temporary consultant workers can be given limited-time and read-only access to specific certificates.
Solution:
- Local user account is created (outside AD)
External Auditorrole is assigned (read-only permissions)- Account expiration date is set
- Access is restricted to specific certificate groups
Consultant Profile:
βββ User Type: Local (outside AD)
βββ Role: Certificate Viewer (read-only)
βββ Access Duration: 90 days
βββ Restriction: Only "Production-Web" certificates
ποΈ Scenario 4: Multi-Tenant Structureβ
Situation: Different companies or business units can use the same platform but cannot access each other's data.
Solution:
- Separate organization is defined for each company/unit
- Organization-based data isolation is provided
- Users access only their organization's data
Organization Structure:
βββ Company A
β βββ Users: user1@companyA.com, user2@companyA.com
β βββ Certificates: *.companyA.com
βββ Company B
β βββ Users: user1@companyB.com, user2@companyB.com
β βββ Certificates: *.companyB.com
βββ Company C
βββ Users: user1@companyC.com
βββ Certificates: *.companyC.com
Review the User Guide: RBAC Management page for user management and role configuration.