Role-Based Access Control (RBAC)

 

Next Steps
Overview Data Masking DCAP Data Quality Test Data Forensics RBAC Stewardship COBIT EMM MDM

IRI software makes it easy for data and information stewards to control the data that ETL architects, business users, governance teams, and report designers can access or affect. The ability to mask data during movement, manipulation, and reporting (for example), allow you to build data stewardship into your processes.

The platform-agnostic and server-independent nature of IRI software also means that you can use existing frameworks like Active Directory object assignments to apply role based access controls (RBAC) at various levels (data, metadata and executable files).

IRI metadata access and activity can be managed through free Eclipse team plug-ins like Git, CVS, and Subversion, or the AnalytiX DS governance platform's IAM-controlled release manager for Voracity ETL, data quality, data masking, etc. projects.

The IRI Chakra Max database activity monitoring and database audit and protection (DAM/DAP) software -- provide built-in RBACs within granular policy-setting modules for 20 popular on-premise and cloud databases. These server-stored policies apply to all monitored databases, and to included dynamic data masking functionality.

See the Data Governance FAQs to understand how IRI software supports RBAC.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.
X

Try Voracity Free

Find, Cleanse, Mask, Audit, Test


Get Info See Demo