Skip to main content

πŸ” RBAC and Authorization

SecTrail CM offers a secure and flexible authorization system with enterprise-level Role-Based Access Control (RBAC). Centrally manage all security layers from user management to permission control.

Why RBAC?

Certificate management is a sensitive operation. Wrong people performing critical operations can lead to security breaches. With RBAC, you ensure that each user has only the permissions appropriate for their role.

Core Principles
  • Least Privilege - Users are given only the minimum permissions they need
  • Separation of Duties - Critical operations are distributed among different roles
  • Defense in Depth - Multi-layered security control is provided

Key Features​

πŸ‘₯ Flexible User Management​

SecTrail CM supports multiple user sources to meet different enterprise needs:

πŸ“ Active Directory (AD) / LDAP Integration​

Use your existing enterprise identity infrastructure:

  • Automatic Synchronization - User information is automatically updated
  • Group-based Management - Map AD groups directly to roles
  • Centralized User Management - User addition/removal is done in AD

πŸ‘€ Local User Accounts​

Independent user management:

  • For external consultants and temporary users
  • Alternative for users without AD access
  • Customizable password policies
  • Manual user creation and management

πŸ”„ Hybrid Management​

You can use both methods simultaneously. For example, employees can log in with AD while external consultants can use local accounts.

πŸ” Role-Based Access Control (RBAC)​

Powerful and flexible role management system:

πŸ—οΈ Hierarchical Role Structure​

  • System Roles - Immutable predefined roles
  • Custom Roles - Create roles specific to your organization
  • Role Inheritance - Roles inheriting permissions from each other

🎯 Granular Permission Control​

Separate permission definition for each operation (CRUD + Execute model):

PermissionDescriptionExample
CreateAdd new resourceCreate new certificate request
ReadView informationView certificate details
UpdateModify existing resourceUpdate certificate information
DeleteRemove resourceDelete certificate or CA
ExecuteTrigger operationCertificate renewal, deployment

🏒 Organization and Group Management​

πŸ‘₯ User Groups​

Organize users:

  • Department-based - IT, DevOps, Security, Network teams
  • Project-based - Teams for specific projects
  • Region/Location-based - Istanbul, Ankara, Izmir offices
  • Bulk Role Assignment - Automatic role distribution to groups

⚑ Dynamic Membership​

Automatic group membership management:

  • AD Group Synchronization - Active Directory groups are automatically synchronized
  • Rule-based Assignment - Automatic group membership based on user attributes
  • Attribute Filtering - Filtering based on attributes like department, title, location

πŸ“Š Detailed Audit and Monitoring​

Record all authorization operations and meet compliance requirements:

πŸ“ User Activity Log​

Monitor all user interactions:

  • βœ… Who logged into the system when?
  • βœ… What operations were performed?
  • βœ… Which resources were accessed?
  • βœ… Failed login attempts
  • βœ… IP address and user agent information

πŸ”„ Role and Permission Changes​

Track authorization changes:

  • Role Assignment/Removal - Who assigned/removed which role to whom, when?
  • Permission Changes - Which permissions were added/removed?
  • Group Membership Changes - Complete history of group memberships
  • Change Author Information - The person who made each change is recorded

πŸ“ˆ Compliance Reports​

Audit and compliance reports:

  • User Access Rights - Report of each user's permissions
  • Active/Inactive User List - User analysis by usage status
  • Last Login Times - User activity tracking
  • Permission Change History - Changes made within a specific date range
  • Privileged User Report - List of highly authorized users

🎭 Predefined Roles​

SecTrail CM offers ready-made roles for quick setup:

RoleDescriptionBasic PermissionsUse Case
πŸ”΄ AdminSystem administrator with all permissionsβ€’ All modules: full access
β€’ User management
β€’ System settings
β€’ Role definition
For system administrators and IT leaders
🟒 APISystem user for API accessβ€’ Certificates: read, execute
β€’ Integrations: execute
β€’ API: full access
For automation and integration systems
Custom Role Definition

These roles meet basic needs. You can create new roles based on your organization's special requirements or customize by cloning existing roles.


πŸ’Ό Use Cases​

🏒 Scenario 1: Department-based Access​

Situation: IT department manages all certificates while DevOps team only sees and can renew certificates for their own projects.

Solution:

  • IT team is assigned the Certificate Manager role
  • A custom DevOps Certificate Operator role is created for DevOps team
  • Access is restricted with project-based tags
Roles:
β”œβ”€β”€ IT Team β†’ Certificate Manager (all certificates)
└── DevOps Team β†’ DevOps Certificate Operator (only tag:project=devops)

βœ… Scenario 2: Approval Mechanism​

Situation: Junior employees can create certificate requests but cannot deploy certificates to production environment without manager approval.

Solution:

  • Juniors get the Certificate Requester role (create, read permissions)
  • Managers get the Certificate Approver role (execute, deploy permissions)
  • Approval mechanism is set up with workflow system
Workflow:
1. Junior β†’ Creates certificate request (create)
2. Manager β†’ Reviews and approves request (approve)
3. System β†’ Deploys approved certificate (execute)

πŸ‘¨β€πŸ’Ό Scenario 3: External Consultant Access​

Situation: Temporary consultant workers can be given limited-time and read-only access to specific certificates.

Solution:

  • Local user account is created (outside AD)
  • External Auditor role is assigned (read-only permissions)
  • Account expiration date is set
  • Access is restricted to specific certificate groups
Consultant Profile:
β”œβ”€β”€ User Type: Local (outside AD)
β”œβ”€β”€ Role: Certificate Viewer (read-only)
β”œβ”€β”€ Access Duration: 90 days
└── Restriction: Only "Production-Web" certificates

πŸ—οΈ Scenario 4: Multi-Tenant Structure​

Situation: Different companies or business units can use the same platform but cannot access each other's data.

Solution:

  • Separate organization is defined for each company/unit
  • Organization-based data isolation is provided
  • Users access only their organization's data
Organization Structure:
β”œβ”€β”€ Company A
β”‚ β”œβ”€β”€ Users: user1@companyA.com, user2@companyA.com
β”‚ └── Certificates: *.companyA.com
β”œβ”€β”€ Company B
β”‚ β”œβ”€β”€ Users: user1@companyB.com, user2@companyB.com
β”‚ └── Certificates: *.companyB.com
└── Company C
β”œβ”€β”€ Users: user1@companyC.com
└── Certificates: *.companyC.com

More Information

Review the User Guide: RBAC Management page for user management and role configuration.