{"id":22947,"date":"2022-05-26T09:14:41","date_gmt":"2022-05-26T13:14:41","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=22947"},"modified":"2022-11-24T03:47:28","modified_gmt":"2022-11-24T08:47:28","slug":"role-based-access-control-rbac-in-eg-enterprise","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/","title":{"rendered":"Role-Based Access Control (RBAC) in eG Enterprise"},"content":{"rendered":"<div class=\"inner_content\">\n<h2><span class=\"ez-toc-section\" id=\"How_to_Leverage_Role-Based_Access_Control_RBAC_in_eG_Enterprise_to_Improve_Security_and_IT_Ops_Efficiency\"><\/span>How to Leverage Role-Based Access Control (RBAC) in eG Enterprise to Improve Security and IT Ops Efficiency<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-23091\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBA-control.webp\" alt=\"\" width=\"300\" height=\"190\" border=\"0\" \/>eG Enterprise is a single pane of glass that provides monitoring and oversight of every layer and tier of your IT infrastructure. However, this does not mean every user in the organization has the same view of the IT infrastructure or needs to use the tool in the same way.<\/p>\n<p>In fact, controlling a user\u2019s view of the monitored applications and infrastructure, as well as their privileges to perform tasks and access data via Role-Based Access Control, is a critical feature for our customers. This is important not only to ensure the product satisfies the needs of each user&#8217;s role (job) and responsibilities, but also to ensure security and data protection across the organization.<\/p>\n<p>Role-Based Access Control (RBAC) in eG Enterprise not only allows you to give your employees the exact permissions they need to do their jobs, but it also enables administrators to limit those permissions to only those they need. Additionally, RBAC can be used to ensure their access to data and views of the infrastructure are restricted where appropriate.<\/p>\n<p>This not only reduces the risks of rogue and ex-employees or contractors using insider knowledge to malicious ends but also enables clear delimitations and responsibilities to be divided between individuals and teams. eG Enterprise\u2019s rich RBAC helps our customers satisfy many compliance and regulatory standards, such as PCI DSS, HIPAA, GLBA, FISMA, SOX, and more.<\/p>\n<p>Our platform fully supports a rich suite of \u201cLimited Component Access\u201d controls associated with RBAC that allow customers to define zones, services, and segments based on factors, such as geographical location, functionality, or end-to-end service. RBAC alone allows permissions to be restricted but \u201cLimited Component Access\u201d allows granularity in what infrastructure those permissions are applied to.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_RBAC\"><\/span>What is RBAC?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-23093\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBA-organization.webp\" alt=\"\" width=\"300\" height=\"280\" border=\"0\" \/> Within an organization, roles are created for various job functions. Permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned specific roles, and through those role assignments, acquire the permissions needed to perform particular system functions. Since the users are not assigned permissions directly, instead of acquiring them through their role (or roles), the management of individual user rights is a matter of assigning appropriate roles to the user&#8217;s account; this simplifies common operations, such as adding a user or changing a user&#8217;s department.<\/p>\n<p>Sophisticated RBAC implementations may include functionality to define hierarchies of business units and\/or user groups within organizations to securely segregate access and permissions further. The ability to define groups of users reflects Unix- and Windows-based permission systems better than simple role definitions.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"RBAC_in_eG_Enterprise_How_it_Helps\"><\/span>RBAC in eG Enterprise: How it Helps?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin-bottom: 15px;\">The granularity of control eG Enterprise\u2019s RBAC offers allows organizations to configure their monitoring and troubleshooting capabilities in numerous ways. Common customer choices we see include:<\/p>\n<ul>\n<li>Restricting Level 1 help desk staff to view only service\/system health and alert information, but enabling second and third-level support engineers with greater insights into the health of each tier being monitored. The third level engineers may even get the ability to remotely interact with user sessions and even execute Remote Control commands and scripts within user sessions &#8211; e.g., to kill processes, logoff a user, or take a screenshot.<\/li>\n<li>In a large organization, there may be different domain experts (e.g., database admins, storage admins, network admins, etc.). These subject matter experts may only be interested in seeing the health of the components they are responsible for. RBAC enables the assignment of views for users that maps to the responsibilities they have in the organization. This ensures that your L1\/L2 Citrix help desk staff do not have visibility or insight on your secure networking infrastructure, such as firewalls, switch failover architectures, and so on.<\/li>\n<li>MSPs (Managed Service Providers) who wish to allow tenants to self-service and manage their own help desk functionality within secure segregated view isolated from other tenants.<\/li>\n<li>Administrators and executives who wish to limit business information and overview reporting to senior management on a strictly need-to-know basis. Business-sensitive information, such as how much an organization is spending on Azure or AWS (Amazon Web Service), is controlled.<\/li>\n<li>Organizations who wish to define zones, services, and segments based on factors, such as geographical location, functionality, or end-to-end service, and allocate them to specific teams or staff. This way your IT team in Europe only sees alerts relevant to the infrastructure they manage.<\/li>\n<li>Those who have sensitive security infrastructure, such as firewalls and networking, and want them to be viewable only by vetted employees and on a need-to-know basis.<\/li>\n<\/ul>\n<p>There are a large number of roles available by default in eG Enterprise that should suffice most users. (See the eG Enterprise documentation <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Adding-New-User-Roles.htm\" target=\"blank\" rel=\"noopener noreferrer\">Adding New User Roles<\/a> for more information.) Broadly, some of the built-in roles block access to specific tabs of the eG Enterprise console. Access to menus within each tab can also be controlled using these roles.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/Pre-defined-largeimage.jpg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23096\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/Pre-defined-role.webp\" alt=\"\" width=\"750\" height=\"278\" border=\"0\" \/><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Custom_Roles\"><\/span>Custom Roles<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For organizations with complex needs, eG Enterprise allows the definition of custom roles, \u201cUser Defined Roles.&#8221; Fine-granularity on permissions allows custom roles to be created for specific organizational roles. With these permissions, you can provide access to specific menus and features of the monitoring tool within any of the tabs of the user interface.<\/p>\n<p><!--<a class=\"fancybox fancybox.iframe\" href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/custom-role-largeimge.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/custom-role.webp\" alt=\"\" width=\"750\" height=\"518\" border=\"0\" class=\"aligncenter size-full wp-image-23099\" \/><\/a>--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23099\" src=\"https:\/\/www.eginnovations.com\/images\/custom-role.svg\" alt=\"\" width=\"850\" height=\"685\" border=\"0\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"RBAC_for_Multi-tenancy_Environments_and_MSPs\"><\/span>RBAC for Multi-tenancy Environments and MSPs<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The release of eG Enterprise v7 saw the introduction of additional roles tailored to the needs of multi-tenant environments and MSP (Managed Service Provider) business models. eG Innovations offers a range of partner models to MSPs to enable them to grow their business by offering customers premium and additional services, such as a frontline help desk and enhanced monitoring and troubleshooting tools. The roles available to MSPs include the ability to delegate self-service capabilities to their tenants without compromising security; some information on these admin models is given in <a href=\"https:\/\/www.eginnovations.com\/blog\/multi-tenant-network-monitoring\/\" target=\"blank\" rel=\"noopener noreferrer\">Multi-Tenant MSP Monitoring.<\/a> You can also read more about <a href=\"https:\/\/www.eginnovations.com\/company\/msp-partners\" target=\"blank\" rel=\"noopener noreferrer\">how a selection of MSPs have grown their businesses using eG Enterprise Managed Services.<\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Controlling_Access_to_Privileged_Functionality\"><\/span>Controlling Access to Privileged Functionality<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>eG Enterprise contains a rich suite of Remote-Control Actions (RCAs) to assist the administrator with troubleshooting and issue resolution. These include the ability to shadow users\u2019 sessions, terminate processes remotely, or change users\u2019 GPOs (Group Policy objects). Many of these actions are powerful, and admins need to control access on a strictly need-to-use basis. As such, most organizations limit access in these instances.<\/p>\n<p>Further, organizations can use RBAC to limit users&#8217; abilities on a highly granular level. Beyond this, the use of Remote Control Actions is logged and can be audited for compliance and security purposes; organizations are able to trace and review the use of invasive and privileged activities, such as remoting into an individual\u2019s desktop or changing the privilege of processes.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Personalized_Views_Complementing_RBAC\"><\/span>Personalized Views: Complementing RBAC<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>While RBAC determines what level of access a user has to the monitoring system, equally important is what portion of the monitored infrastructure can the user view and analyze. Personalized views in eG Enterprise determine the subset of the monitored infrastructure to which users have access. This subset can be configured by an administrator manually. Alternatively, this subset can be auto-determined.<\/p>\n<p style=\"margin-bottom: 15px;\">To assist with such auto-discovery, eG Enterprise supports three different entities:<\/p>\n<ul>\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Organization\"><\/span><strong>Organization:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Typically in an enterprise deployment, there is only one organization. A SaaS\/MSP deployment may have many organizations \u2013 one for each customer. Each organization has a strict delineation of responsibilities so there is no sharing of information across entities.<\/li>\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Organizational_Unit\"><\/span><strong>Organizational Unit:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Smaller user groups within an organization can be created as Organizational units &#8211; e.g., departments within an organization, support groups within a technical support cell, the different branches of an enterprise, etc. For example, the retail banking department and the call center can be different departments within a banking organization. An Organizational Unit can contain more organizational units or individual users.<\/li>\n<li>\n<h4><span class=\"ez-toc-section\" id=\"User\"><\/span><strong>User:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>These are individual users who can belong to an Organization or an Organizational Unit.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/organization-view.jpg\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23100\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/organization.webp\" alt=\"\" width=\"750\" height=\"470\" border=\"0\" \/><\/a><\/p>\n<p>Auto-mapping of components to organizations and organizational units is done using unique UUIDs assigned to each organization or OU. When a user of an OU downloads agents from the management server, these agents are auto-configured with the OU\u2019s UUID. The UUID information is transmitted by the agents to the manager when they begin communication and this allows the infrastructure being monitored by these agents to be auto-assigned to users. This capability is particularly useful in SaaS deployments as it allows users to download and install agents, as well as auto manage these agents without needing any assistance from their MSP.<\/p>\n<p>Sometimes, there may be a need to share access to a monitored infrastructure with others. For example, the database team may have multiple members, each of whom may need similar access. eG Enterprise\u2019s three-level configuration of entities and assignment of UUIDs allows it to cater to such requirements as well.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Ensure_the_Rest_of_your_Infrastructure_Implements_Best_Practices_for_RBAC\"><\/span>Ensure the Rest of your Infrastructure Implements Best Practices for RBAC<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-23134\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/cartoon-img.webp\" alt=\"\" width=\"300\" height=\"334\" border=\"0\" \/> Most modern application stacks include their own RBAC implementations, and eG Enterprise can be used to monitor and audit that RBAC usage is compliant, appropriate, and secure, for example when accessing Microsoft Azure. Microsoft details <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/role-based-access-control\/best-practices\" target=\"blank\" rel=\"noopener noreferrer\">Best practices for Azure RBAC<\/a> well. eG Enterprise\u2019s comprehensive monitoring for Azure Active Directory (Azure AD) will help you ensure you adhere to these best practices in a traceable and audited manner by process.<\/p>\n<p>For those leveraging roles with high privileges, eG Enterprise includes the ability to allow for admin user access only from select locations (IP addresses), a fixed IP, or range of IPs usually associated with a privileged admin workstation.<\/p>\n<p><strong>Note:<\/strong> RBAC can be integrated with single sign on (SSO) using Active Directory Integration, SAML authentication, or 2FA support for high security.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Learn_More\"><\/span>Learn More:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Read more about monitoring Active Directory here: <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/active-directory-monitoring\" target=\"blank\" rel=\"noopener noreferrer\">Active Directory Monitoring and Management.<\/a><\/li>\n<li>A recent series of blogs covers monitoring and auditing Azure AD Users and Accounts \u2013 see:\n<ul style=\"margin-top: 6px;\">\n<li><a href=\"https:\/\/www.eginnovations.com\/blog\/what-is-azure-active-directory\/\/\" target=\"blank\" rel=\"noopener noreferrer\">Azure Active Directory (Azure AD) \u2013 101<\/a><\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/blog\/track-users-azure-active-directory\/\" target=\"blank\" rel=\"noopener noreferrer\">Monitor Azure Active Directory Users<\/a><\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/blog\/azure-ad-app-client-secret-certificate-expirations-alerts\/\" target=\"blank\" rel=\"noopener noreferrer\">Azure AD Monitoring Tips and Strategies<\/a><\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/blog\/monitor-azure-ad-audit-logs\/\" target=\"blank\" rel=\"noopener noreferrer\">Azure AD Audit Logs<\/a><\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/blog\/active-directory-sign-in-logs\/\" target=\"blank\" rel=\"noopener noreferrer\">Azure AD Monitoring<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Checkout our short how-to series of videos that covers how to configure users, as well as working with groups, services, zones, and segments to limit access and privileges within eG Enterprise; see <a href=\"https:\/\/www.youtube.com\/playlist?list=PL8QsLiuaAeDm8XCvM3gw5P6IJ2y3plTuQ\" target=\"blank\" rel=\"noopener noreferrer\">How To Videos &#8211; YouTube.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How to Leverage Role-Based Access Control (RBAC) in eG Enterprise to Improve Security and IT Ops Efficiency eG Enterprise is a single pane of glass that provides monitoring and oversight of every layer and tier of your IT infrastructure. However, this does not mean every user in the organization has the same view of the [&hellip;]<\/p>\n","protected":false},"author":57,"featured_media":27291,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[409,366,383,388],"tags":[610,658,562,609],"class_list":["post-22947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eg-enterprise","category-end-to-end-monitoring-e2e","category-it-infrastructure-monitoring","category-managed-service-providers-msps","tag-enterprise-monitoring-tool","tag-monitoring-best-practices","tag-msp-monitoring","tag-role-based-access-control"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Role-Based Access Control in eG Enterprise | eG Innovations<\/title>\n<meta name=\"description\" content=\"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Role-Based Access Control in eG Enterprise | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-26T13:14:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-24T08:47:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Social-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krishnamurthi Srinivasan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Role-Based Access Control in eG Enterprise | eG Innovations\" \/>\n<meta name=\"twitter:description\" content=\"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Social-Banner.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krishnamurthi Srinivasan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Role-Based Access Control in eG Enterprise | eG Innovations","description":"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/","og_locale":"en_US","og_type":"article","og_title":"Role-Based Access Control in eG Enterprise | eG Innovations","og_description":"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.","og_url":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2022-05-26T13:14:41+00:00","article_modified_time":"2022-11-24T08:47:28+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Social-Banner.jpg","type":"image\/jpeg"}],"author":"Krishnamurthi Srinivasan","twitter_card":"summary_large_image","twitter_title":"Role-Based Access Control in eG Enterprise | eG Innovations","twitter_description":"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Social-Banner.jpg","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Krishnamurthi Srinivasan","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/"},"author":{"name":"Krishnamurthi Srinivasan","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/b72120370c7ccdca0685addb1b92193f"},"headline":"Role-Based Access Control (RBAC) in eG Enterprise","datePublished":"2022-05-26T13:14:41+00:00","dateModified":"2022-11-24T08:47:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/"},"wordCount":1713,"commentCount":0,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Thumbnail.jpg","keywords":["enterprise monitoring tool","Monitoring best practices","MSP monitoring","Role based access control"],"articleSection":["eG Enterprise","End-to-End Monitoring (E2E)","IT Infrastructure Monitoring","Managed Service Providers (MSPs)"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/","url":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/","name":"Role-Based Access Control in eG Enterprise | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Thumbnail.jpg","datePublished":"2022-05-26T13:14:41+00:00","dateModified":"2022-11-24T08:47:28+00:00","description":"Learn how eG Enterprise provides granular control over user permissions with Role-Based Access Control (RBAC). Start your free trial today.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Thumbnail.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/RBAC-eG-Thumbnail.jpg","width":362,"height":235},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Role-Based Access Control (RBAC) in eG Enterprise"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/b72120370c7ccdca0685addb1b92193f","name":"Krishnamurthi Srinivasan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6ee31821c85fcc98673d39626fc5c92b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ee31821c85fcc98673d39626fc5c92b?s=96&d=mm&r=g","caption":"Krishnamurthi Srinivasan"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/krishnamurthi-srinivasan\/"}]}},"modified_by":"Review eG","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/22947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=22947"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/22947\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/27291"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=22947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=22947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=22947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}