Skip to main content

Access Controls

This article details the different access control options in the Security menu.

Introduction to access control

Administrators in the Brinqa Platform can create permissions for roles, determining which modules they can access and how they can interact with them. Your Brinqa Platform starts with certain default permissions, but you can expand or modify them through the access control page.

To manage access controls, click Administration admin-button on the upper-right corner and under Security, select Access Controls.

The Access controls page displays a list view of the existing permissions in the Brinqa Platform. The following table details the columns on this page:

Table 1: Access control page columns

ColumnsDescription
TitleThe name of the permission.
TypeThe type of module that the permission is for. Options include: System, Data model, Application, or Flow Action.
OperationThe action that can be performed. Options include: Create, Read, Update, Delete, Reset password, or All.
ResourceThe target of the permission. Options include: User, Role, Application event log, or all targets indicated by an asterisk (*).
RolesThe roles that have this permission.
ActiveWhether this permission is active. Inactive permissions are effectively archived.
Last updatedWhen the permission was last updated.

Default access controls

Your Brinqa Platform comes with default roles and permissions. The following tables cover the permissions of the System Administrator, Administrator, Security Administrator, Risk Analyst, Configurator, and User roles.

Table 2: Default access controls

RolePermissions
System AdministratorAll permissions.
AdministratorReset password.
Security AdministratorCreate user, Edit user, Read user, Delete user, Create role, Edit role, Read role, and Delete role.
Risk analystRead user.
ConfiguratorRead role, Read user, and Read application event logs.
UserRead only across the instance.

Create a new access control

  1. Navigate to Administration admin-button > Security > Access controls.

  2. Click Create.

  3. Fill in the following fields:

    • Title: The title of the access control.

    • Name: The name of the access control.

    • Type: The type of module that the access control is for. Options include: Data model, Application, or Flow action. The following table details the different fields associated with the different access control types:

      Table 3: Access control fields by type

      Selected typeAvailable fieldsDescription
      Data modelOperationsThe action that can be performed. Options include: Create, Read, Update, or Delete.
      Data modelThe data model that the access control applies to.
      AttributesThe attributes of the data model. If no attributes are selected, you have access to all attributes of that data model.
      ApplicationOperationsThe action that can be performed. Options include: Access.
      ApplicationThe application that the access control applies to. Options include: Brinqa Platform or Cyber risk.
      Flow actionData modelThe data model that the access control applies to.
      OperationsThe action that can be performed. Options include: Execute or Transition.
      Flow definitionThe action that the flow accomplishes. Options include: data model delete flow or compute flow.
      Flow typeThe type of flow associated with the flow action. Options include: Button flow or Business process. A button flow
    • Description: The description of the access control.

    • Active: Whether the access control is active. Inactive access controls are effectively archived.

    • Access control roles: Roles that can have this permission.

    • Access control filter: Set filters for the access control. For example, you can use filters to configure different access controls for the same data model.

  4. Click Create.

Edit or delete an access control

You can edit or delete existing access controls. Hold the pointer over the entry and click Edit or Delete to modify an existing access control.

The User role has the following permissions:

Table 4: User permissions

PermissionResources
ReadApplication
ReadBusiness Service
ReadComponent
ReadHost
ReadIssue
ReadIssue Definition
ReadTicket
ReadVulnerability
ReadVulnerability Definition

The Configurator role has the User role as a parent, so it inherits all the permissions from the User role. In addition, the Configurator role has the following permissions:

Table 5: Configurator permissions

PermissionResource
Create, Read, Update, DeleteData Model
Create, Read, Update, DeleteData Server
Create, Read, Update, Delete, Test ConnectionData Source
Create, Read, Update, DeleteData Source Rule
ManageIndex
Create, Read, Update, DeleteMail Template
Create, Read, Update, DeleteNotification
Create, Read, Update, DeleteNotification Script
Create, Read, Update, DeleteRule
Create, Read, Update, DeleteScheduled Notification
Create, Read, Update, DeleteScheduled Rule
Create, Read, Update, DeleteScheduled Sync
Import, ExportSettings
Create, Read, Update, DeleteTicket Creation Rule
Create, Read, Update, DeleteTicket Closing Rule
Create, Read, Update, DeleteViews

The Security administrator role has the User and Configurator role as a parent, so it inherits all the permissions from the User and Configurator roles. In addition, the Security administrator role has the following permissions:

Table 6: Security administrator permission

PermissionResource
Create, Read, Update, DeleteAccess Control
Create, Read, Update, DeleteRole
Create, Read, Update, DeleteUser
Create, Read, UpdatePassword Policy

The Risk analyst role has the User, Configurator, and Security administrator role as a parent, so it inherits all the permissions from the User, Configurator, and Security administrator roles. In addition, the Risk analyst role has the following permissions:

Table 7: Risk analyst permissions

PermissionResource
Create, Update, DeleteApplication
Create, Update, DeleteBusiness Service
Create, Read, Update, DeleteBusiness Unit
Create, Read, Update, DeleteCompany
Create, Update, DeleteComponent
ReadUser
ReadData Model
Create, Read, Update, DeleteDepartment
Create, Read, Update, DeleteDivision
Create, Update, DeleteHost
Create, Update, DeleteIssue
Create, Update, DeleteIssue Definition
Create, Read, Update, DeleteLocation
Create, Read, Update, Delete, Run, ShareReport
Create, Update, DeleteTicket
Update, DeleteViews
Create, Update, DeleteVulnerability
Create, Update, DeleteVulnerability Definition