Roles
Overview of user roles in Next Identity console
Next Identity console offers a streamlined and secure user roles and permissions system tailored to meet the diverse needs of our customers. This document outlines the roles available to our customers within the Next Identity console, each designed to provide specific access and functionality. These roles are aligned with the two distinct Platform Views: Service Management and Application Management.
Service Management View Roles
Role | Description |
---|---|
Viewer | Grants view-only access to all system data without modification privileges, excluding the ability to view Users and Roles. |
Onboarding Viewer | Provides exclusive view-only access to onboarding data and features, with no modification privileges. |
Operations Manager | Comprehensive management capabilities, including overseeing user permissions, assigning roles, and managing properties, clients, configurations, translations, and workflows. Excludes secret management. |
Secret Viewer | Limited to viewing secrets only, without the capability to modify them. |
Secret Rotator | Specialized access to view and rotate secrets, ensuring sensitive information remains secure and up to date. |
Application Management View Roles
Role | Description |
---|---|
Viewer | Grants view-only access to all data within the Application Management view without modification privileges, excluding the ability to view Users and Roles. |
Application Manager | Authorized to manage properties and clients within the Application Management view, including configurations, translations, and workflows. Excludes secret management. |
Secret Viewer | Limited to viewing secrets within the Application Management view only, without the capability to modify them. |
Secret Rotator | Specialized access to view and rotate secrets within the Application Management view, ensuring sensitive information remains secure and up to date. |
Requesting Administrative Tasks
The Next Identity console offers distinct roles like Viewer, Feature Adoption Viewer, Secret Rotator, Secret Reader, and Operator, each with its specific set of permissions. For tasks such as inviting new users or managing roles, customers should seek help from a Next Identity consultant to ensure these operations are expertly managed, upholding the system's integrity and security.
User Management Advisory
If you need to invite a user or manage roles, please contact your Next Identity consultant.
If you'd like to know more about our User Management feature, explore our guide.
Updated 4 months ago