Overview
Create roles, map capabilities, and assign least-privilege access.
Prerequisites
None.
Permissions required
Downloads & Templates
Steps (4)
-
1
Create roles
Navigate to Settings → RBAC → Roles → New. Name roles (e.g., “viewer”, “analyst”, “admin”).
Tips
—
Validation
- Roles appear in the list with unique slugs.
Success criteria
—
-
2
Map permissions
Assign capabilities like users:read, sessions:read, profiles:write, iam:configure.
Tips
- Use “viewer” for read-only; keep “iam:configure” to a minimal set.
Validation
—
Success criteria
—
-
3
Assign to users or groups
Open Users → select a user → Roles tab. For SSO, set group/claim → role rules.
Tips
—
Validation
—
Success criteria
- All admins have two-person control; no broad admin on service accounts.
-
4
Audit & export
Export role matrix and verify no privilege creep.
Tips
—
Validation
—
Success criteria
—
About this guide
AccessGuard secures apps and external sites with hosted authentication and short-lived JWTs. Enable MFA, define RBAC permissions, and connect enterprise identity via SAML or OIDC. A lightweight HMAC bridge lets you embed login, registration, and token refresh flows on any domain without CORS pain.
Admins manage users, sessions, connections, and policies from one console. Profiles consolidate verified emails/phones, consents, KYC docs, and risk flags. Events and metrics provide visibility for security and ops.
Designed for velocity and safety: opinionated defaults, least-privilege keys, Prometheus counters, and exportable audit logs.