Administrators can easily manage users, roles and permissions, while auditors have comprehensive overviews and detailed information to control user rights and sensitive operations in your applications.
The WebConsole Dashboard gives access to the main information and features for managing access control.
The WebConsole helps administrators manage user accounts.
They can :
Administrators can use the WebConsole to group permissions into roles, representing certain functions of your organization.
Two types of roles are available:
Administrators can then assign roles to individual users.
They can also grant them to user groups, in which case all users placed in these groups will automatically be granted these roles.
Administrators can also add user groups below a parent group, thus forming a group hierarchy representing entities of your organization. In this case, children group automatically get the role(s) of their parent group(s).
Finally, in the case of large volumes of permissions, administrators can use the web console to create permission sets, group permissions into permission sets, then group permission sets into roles.
The WebConsole helps administrators and auditors to monitor closely the access rights granted to users, which is usually very challenging when users and permissions are numerous and constantly changing:
A Visual Guard workflow is a set of automated processes that allow security and identity management tasks to be managed dynamically and efficiently within an application or system.
VG Workflows are designed to automate repetitive processes, reduce human error and accelerate security management operations.
For example, a workflow could be configured for:
The Event Viewer lets you review security events within applications.
Here are the main categories of events you can find:
To isolate events relevant to an investigation or audit, data can be filtered to specifically target an event type, date range, specific users or critical operations.
The event viewer can be launched from different locations, depending on the scope of the events to be analyzed:
The Monitoring section provides a graphical representation of security events to analyze user activities and system processes: