RBAC
Threatrix role based access control plays an important role in the security of our platform. Roles are enforced throughout Threat Center and across the entire Threatrix ecosystem, including our API.
Role Composition
Roles are composed of permissions that grant access to granular micro and macro features across the Threatrix ecosystem. Nearly every feature is protected by the RBAC, which allows user administrators to construct custom roles based on the needs of each group or individual user.
As roles are enforced within both Threat Center and our API, configuring permissions and created roles is an important step in securing your sensitive data from unauthorized access.
Out of the Box Roles
These roles are intended to get you up and running quickly. Available roles and permissions are as follows:
Last updated