Access Control

Compliance Solutions

Access Control

Detailed, granular access rights management capabilities allow you to configure the exact user permissions you need to support segregation of duties, rule of least privilege, and organizational security standards.

Control your organizational security policies

Servergraph supports integration with Microsoft Active Directory for user account and access rights management.  This allows your organizational security policies, including password and other authentication standards, to apply to Servergraph application access.

Within the application, Servergraph offers detailed, customizable role-based access permissions that can be associated with your various users and backup systems.  Each user can be assigned to one or more “Scopes” that grant access to specific backup processes, devices, reports, and functions.  This allows you to restrict users to only the data and actions necessary to perform their job function, and supports specialized roles just as application administrator, report reviewer, or auditor, all of which can be further restricted to only certain elements of your backup environment.

System administration is further segregated from the application and is only accessible to users with the administrative maintenance client application.

Organizational access management for ALM applications

Rocket Aldon Lifecycle Manager for IBM i supports user access integration with IBM i and other ALM modules. It utilizes IBM i’s built-in authentication, which can be integrated with other user access directories, enabling you to apply organizational access management and authentication controls to your ALM applications.

Rocket ALM has granular, highly-configurable permissions management capabilities. Every application under development—even every version/release within each application—can have unique user access permissions. With Rocket Aldon Lifecycle Manager (Enterprise Edition), each user is assigned an access role for each version/release. Roles are fully configurable and allow you to define customized access permissions including check-out and check-in for specified environments, read-only permissions, independent code reviews, independent approval authorities, code promotion capabilities, and any other roles needed to support your SDLC change control processes. System administration is further segregated from the application and is only accessible to users with the Security Server Administrator client application.

Questions? Call us: U.S. +1 855-577-4323