Skip to main content

Access Needed to Manage Applications

EmpowerID employs Management Roles to control access to its resources. Users must be assigned appropriate roles to manage and interact with applications within the system. These Management Roles are categorized based on their functional prefixes in EmpowerID, as described below.

  • UI Roles: These roles, identified by the "UI" prefix, provide users access to specific interface elements within the EmpowerID interfaces. For instance, the role "UI-Res-Admin-MS-Application" enables access to user interfaces and workflows essential for managing applications.
  • VIS Roles: Roles starting with "VIS" enable users to view specific objects within EmpowerID. A typical role in this category is "VIS-Application-MyOrganization," which allows users to view applications and their subcomponents in their organizations.
  • ACT Roles: These roles, prefixed with "ACT," authorize users to actively manage specific objects in EmpowerID. For example, "ACT-Azure-Application-Administration-All" grants users access to create, update, and delete Azure applications.

To facilitate easy access assignments, EmpowerID offers "Role Bundle" Management Roles. These bundles are pre-configured with the requisite roles necessary for various operational scenarios, allowing for convenient and rapid deployment of access rights suited to specific user requirements and organizational workflows. This bundling strategy simplifies the administration of roles and enhances security by ensuring that users have precisely the access they need to perform their duties.

Application Role Bundles

Application Admin for All Azure Applications

This role bundle grants users access to manage all Azure applications. The role bundle is comprised of the following Management Roles:

View Roles
Management RoleAccess Granted by Management Role
1ACT-Application-Create-AllGrants access to create new applications in all locations.
2ACT-Azure-Application-Administration-AllGrants access to create, update, and delete all Azure applications.
3ACT-Business-Role-CanUseInAssignments-AllGrants the ability to assign to all Business Roles access to other resources. This role does not permit the management of access assignments for the Business Role because the assigner would still need access to the resource or role they wish to assign to the Business Role.
4ACT-Global-Right-Azure-Administrator-AllGrants access to create and delete Azure Application Roles, Scopes, and API Permissions.
5ACT-Group-CanUseInAssignments-AllGrants the ability to assign groups access to other resources. This role does not permit the management of access assignments for the group because the assigner would still need access to the resource or role they wish to assign to the group.
6ACT-Local-Right-Assignment-Management-Azure-AllGrants access to manage Azure App Role/Right assignments for all App Roles in any tenant.
7ACT-Local-Right-Create-AllGrants access to create Local Rights in all locations.
8ACT-Local-Right-Assignment-Management-AllGrants access to can manage Local Right assignments for all Local Rights below Default Organization.
9ACT-Local-Role-Assignment-Management-Azure-AllGrants access to manage role assignments for all roles in any tenant.
10ACT-Local-Role-Create-AllGrants access to create Local Roles / Role Definitions in all locations.
11ACT-Location-Assignment-AllGrants acces to operations for managing the assignments of people to all locations.
12ACT-Location-CanUseInAssignments-AllIs able to grant a location an access assignment for another resource for all locations.
13ACT-Management-Role-CanUseInAssignments-AllGrants the ability to assign to Management Roles an access assignment for other resources. This role does not permit the management of access assignments for the Management Role because the assigner would still need access to the resource or role they wish to assign to the Management Role.
14ACT-Person-CanUseInAssignments-AllGrants the ability to assign any person an access assignment for other resources. This role does not permit the management of access assignments for the person because the assigner would still need access to the resource or role they wish to assign to the person.
15ACT-SetGroup-CanUseInAssignments-AllGrants the ability to assign to SetGroups an access assignment for other resources. This role does not permit the management of access assignments for the SetGroup because the assigner would still need access to the resource or role they wish to assign to the SetGroup.
16ACT-Shared-Credential-Create-AllGrants the ability able to create a shared credential anywhere.
17ACT-Shared-Credential-Object-Administration-Azure-AllGrants the ability to create, edit, and delete all secrets and certificates in Azure.
18UI-Res-Admin-MS-ApplicationProvides access to the UI for managing applications.
19VIS-Accounts-Azure-AllProvides access to see all Azure accounts.
20VIS-Application-MyOrganizationGrants access to see applications and their subcomponents in person's organizations.
21VIS-AzGlobalRight-AllGrants access to see all AzGlobalRights.
22VIS-AzLocalRight-AllGrants access to see all AzLocalRights.
23VIS-AzLocalRole-AllGrants access to see all AzLocalRoles.
24VIS-AzureApplication-AllProvides access to see all Azure Applications in any tenant.
25VIS-BusinessRole-AllGrants access to see all Business Roles.
26VIS-Groups-AllGrants access to see all groups.
27VIS-Location-AllGrants access to see all locations.
28VIS-Management-Role-AllGrants access to see all Management Roles.
29VIS-Person-MyOrgGrants access to see all people in my organizations.
30VIS-SetGroup-AllGrants access to see all SetGroups (Query-Based Collections).
31VIS-Shared-Credential-AllGrants access to see all vaulted credentials.
32VIS-Shared-Credential-Azure-AllGrants access to see all secrets and certificates in any Azure tenant.

Application Admin for all Non-Azure Applications

This role bundle grants users access to create, update, and delete all applications that are not Azure applications. The role bundle is comprised of the following Management Roles:

View Roles
Management RoleAccess Granted by Management Role
1ACT-Application-Create-AllGrants access to create new applications in all locations.
2ACT-Application-Object-Administration-AllGrants access to create, update, and delete all applications.
3ACT-Business-Role-CanUseInAssignments-AllGrants the ability to assign to all Business Roles access to other resources. This role does not permit the management of access assignments for the Business Role because the assigner would still need access to the resource or role they wish to assign to the Business Role.
4ACT-Group-CanUseInAssignments-AllGrants the ability to assign groups access to other resources. This role does not permit the management of access assignments for the group because the assigner would still need access to the resource or role they wish to assign to the group.
5ACT-Local-Right-Create-AllGrants access to create Local Rights in all locations.
6ACT-Local-Right-Object-Administration-App-MyResponsibleProvides access to create, update, and delete all Local Rights belonging to an application where the person is responsible party.
7ACT-Local-Right-Object-Administration-App-OwnerProvides access to create, update, and delete all Local Rights belonging to an application where the person is the RBAC Owner.
8ACT-Local-Role-Object-Administration-App-MyResponsibleGrants access to create, update, and delete all Local Roles belonging to an application where the person is responsible party.
9ACT-Local-Role-Object-Administration-App-OwnerGrants access to create, update, and delete all Local Roles belonging to an application where the person is the RBAC Owner.
10ACT-Location-CanUseInAssignments-AllIs able to grant a location an access assignment for another resource for all locations.
11ACT-Management-Role-CanUseInAssignments-AllGrants the ability to assign to Management Roles an access assignment for other resources. This role does not permit the management of access assignments for the Management Role because the assigner would still need access to the resource or role they wish to assign to the Management Role.
12ACT-Management-Role-Object-Administration-App-MyResponsibleGrants the ability to create, update, and delete all Management Roles associated with an application where the person is responsible party.
13ACT-Management-Role-Object-Administration-App-OwnerGrants the ability to create, update, and delete all Management Roles associated with an application where the person is the RBAC owner.
14ACT-Person-CanUseInAssignments-AllGrants the ability to assign any person an access assignment for other resources. This role does not permit the management of access assignments for the person because the assigner would still need access to the resource or role they wish to assign to the person.
15UI-Application-Object-AdministrationGrants access to user interface and workflows for creating, editing, and deleting applications.
16UI-Application-PBAC-Policy-AssignerGrants access to user interface and workflows for viewing and assigning PBAC roles and rights.
17UI-Eligibility-Policy-ManagementGrants the ability to see user interfaces for eligibility policies and run workflows.
18UI-Res-Admin-MS-ApplicationProvides access to the UI for managing applications.
19UI-Res-Admin-MS-CommonGrants access to common/shared UI used by the Resource Admin microservice.
20VIS-Application-AllProvides access to see all applications and subcomponents.
21VIS-AzFieldType-AllProvides access to see all Field Types.
22VIS-AzGlobalRight-AllProvides access to see all global rights.
23VIS-AzGlobalRole-AllProvides access to see all global roles.
24VIS-AzLocalRole-AllGrants access to see all AzLocalRoles.
25VIS-BusinessRole-AllGrants access to see all Business Roles.
26VIS-Location-AllGrants access to see all locations.
27VIS-Management-Role-AllGrants access to see all Management Roles.
28VIS-Misc-AdminProvides visibility for miscellaneous admin required views.
29VIS-OrgRoleOrgZone-ALLGrants access to see all Business Role and Location combinations.
30VIS-Person-AllGrants access to see all people.

Application Administrator for All Applications

This role bundle allows users to manage all applications via the Resource Admin microservice. This role bundle is comprised of the following Management Roles:

View Roles
Management RoleAccess Granted by Management Role
1ACT-Azure-Application-Administration-AllGrants access to create, update, and delete all Azure applications.
2ACT-Business-Role-CanUseInAssignments-AllGrants the ability to assign to all Business Roles access to other resources. This role does not permit the management of access assignments for the Business Role because the assigner would still need access to the resource or role they wish to assign to the Business Role.
3ACT-Global-Right-Azure-Administrator-AllGrants access to create and delete Azure Application Roles, Scopes, and API Permissions.
4ACT-Group-CanUseInAssignments-AllGrants the ability to assign groups access to other resources. This role does not permit the management of access assignments for the group because the assigner would still need access to the resource or role they wish to assign to the group.
5ACT-Local-Right-Assignment-Management-AllGrants access to manage Local Right assignments for all Local Rights below Default Organization.
6ACT-Local-Role-Assignment-Management-AllProvides access to manage Local Role assignments for all Local Roles below Default Organization.
7ACT-Local-Role-Assignment-Management-Azure-AllProvides access to manage role assignments for all roles in any tenant.
8ACT-Local-Role-Create-AllGrants access to create Local Roles / Role Definitions in all locations.
9ACT-Location-Assignment-AllGrants access to operations for managing assignments of people to all locations.
10ACT-Location-CanUseInAssignments-AllIs able to grant a location an access assignment for another resource for all locations.
11ACT-Management-Role-CanUseInAssignments-AllGrants the ability to assign to Management Roles an access assignment for other resources. This role does not permit the management of access assignments for the Management Role because the assigner would still need access to the resource or role they wish to assign to the Management Role.
12ACT-Person-CanUseInAssignments-AllGrants the ability to assign any person an access assignment for other resources. This role does not permit the management of access assignments for the person because the assigner would still need access to the resource or role they wish to assign to the person.
13ACT-SetGroup-CanUseInAssignments-AllGrants the ability to assign to SetGroups an access assignment for other resources. This role does not permit the management of access assignments for the SetGroup because the assigner would still need access to the resource or role they wish to assign to the SetGroup.
14ACT-Shared-Credential-Create-AllGrants access to create a shared credential anywhere.
15ACT-Shared-Credential-Object-Administration-Azure-AllGrants access to create, edit, and delete all secrets and certificates in Azure.
16UI-Res-Admin-MS-ApplicationProvides access to the UI for managing applications.
17VIS-Accounts-Azure-AllGrants access to see all Azure accounts.
18VIS-Application-MyOrganizationGrants access to see applications and their subcomponents in person's organizations.
19VIS-AzGlobalRight-AllProvides access to see all global rights.
20VIS-AzLocalRight-AllGrants access to see all local rights.
21VIS-AzLocalRole-AllGrants access to see all local roles.
22VIS-AzureApplication-AllGrants access to see all Azure Applications in any tenant.
23VIS-BusinessRole-AllGrants access to see all Business Roles.
24VIS-Groups-AllProvides access to see all groups.
25VIS-Location-AllGrants access to see all locations.
26VIS-Management-Role-AllGrants access to see all Management Roles.
27VIS-Person-MyOrgGrants access to see all people in the person’s organization.
28VIS-SetGroup-AllProvides access to see all Query-Based Collections (SetGroups).
29VIS-Shared-Credential-AllProvides access to see all vaulted credentials.
30VIS-Shared-Credential-Azure-AllProvides access to view all secrets and certificates in any Azure tenant.

Application RBAC Owner

This role bundle allows users to create new applications and manage all applications where they are the RBAC owner. The role bundle is comprised of the following Management Roles:

View Roles
Management RoleAccess Granted by Management Role
1ACT-Account-CanUseInAssignments-AllGrants the ability to assign to all accounts access to other resources. This role does not permit the management of access assignments for the account because the assigner would still need access to the resource or role they wish to assign to the account.
2ACT-Application-Create-AllGrants access to create new applications in all locations.
3ACT-Application-Object-Administration-OwnerGrants access to manage all applications where the person is an RBAC owner.
4ACT-Azure-Application-Object-Administration-OwnerGrants access to manage all Azure applications where the person is an RBAC owner.
5ACT-Azure-Application-Create-AllGrants the ability to create Azure Applications in all locations.
6ACT-Business-Role-CanUseInAssignments-AllGrants the ability to assign to all Business Roles access to other resources. This role does not permit the management of access assignments for the Business Role because the assigner would still need access to the resource or role they wish to assign to the Business Role.
7ACT-FieldType-CreateGrants the ability to create Field Types.
8ACT-FieldType-Object-Administration-AllGrants object administration (Create, Update, Delete) for all Field Types.
9ACT-Group-CanUseInAssignments-AllGrants the ability to assign groups access to other resources. This role does not permit the management of access assignments for the group because the assigner would still need access to the resource or role they wish to assign to the group.
10ACT-Local-Right-Assignment-Management-App-OwnerGrants access to manage right assignments for rights where the person is the RBAC Owner for the application that owns the rights.
11ACT-Local-Right-Create-AllGrants access to create Local Rights in all locations.
12ACT-Local-Right-Object-Administration-App-OwnerProvides access to create, update, and delete all Local Rights belonging to an application where the person is the RBAC Owner.
13ACT-Local-Role-Create-AllGrants access to create Local Roles / Role Definitions in all locations.
14ACT-Local-Role-Object-Administration-App-OwnerGrants access to create, update, and delete all Local Roles belonging to an application where the person is the RBAC Owner.
15ACT-Location-Assignment-AllGrants access to operations needed for managing assignments of people to locations.
16ACT-Location-CanUseInAssignments-AllIs able to grant a location an access assignment for another resource for all locations.
17ACT-Management-Role-CanUseInAssignments-AllGrants the ability to assign to Management Roles an access assignment for other resources. This role does not permit the management of access assignments for the Management Role because the assigner would still need access to the resource or role they wish to assign to the Management Role.
18ACT-Management-Role-Create-AllGrants access to create Management Roles in all locations.
19ACT-Management-Role-Membership-Management-App-OwnerGrants access to manage the membership of Management Roles associated with an application where person is an owner.
20ACT-Management-Role-Object-Administration-App-OwnerGrants the ability to create, update, and delete all Management Roles associated with an application where the person is the RBAC owner.
21ACT-Person-CanUseInAssignments-AllGrants the ability to assign any person an access assignment for other resources. This role does not permit the management of access assignments for the person because the assigner would still need access to the resource or role they wish to assign to the person.
22ACT-SetGroup-CanUseInAssignments-AllGrants the ability to assign to SetGroups an access assignment for other resources. This role does not permit the management of access assignments for the SetGroup because the assigner would still need access to the resource or role they wish to assign to the SetGroup.
23ACT-Shared-Credential-Object-Administration-App-OwnerGrants the ability to create, edit, and delete shared credentials associated with application where the person is owner.
24UI-Application-Object-AdministrationGrants access to user interface and workflows for creating, editing, and deleting applications.
25UI-Application-PBAC-Object-AdministrationGrants access to user interface and workflows for creating, editing, and deleting PBAC policy objects for applications (e.g., Rights, Field Types, Roles, etc.).
26UI-Application-PBAC-Policy-AssignerGrants access to user interfaces and workflows for viewing and assigning PBAC roles and rights.
27UI-Eligibility-Policy-ManagementGrants the ability to see user interfaces for eligibility policies and run workflows.
28UI-Res-Admin-MS-ApplicationProvides access to the UI for managing applications.
29VIS-Accounts-AllGrants access to see all accounts.
30VIS-Application-WhereOwnerGrants access to see EmpowerID and Azure applications and their subcomponents where the person is the application owner in EmpowerID or Azure.
31VIS-AzFieldType-AllProvides access to see all Field Types.
32VIS-AzGlobalRight-AllProvides access to see all global rights.
33VIS-AzGlobalRole-AllProvides access to see all global roles.
34VIS-AzLocalRight-App-OwnerGrants access to see all local rights where the person is the RBAC Owner for the application with the local rights.
35VIS-AZLocalRole-App-OwnerGrants access to see all local loles / role definitions where the person is the RBAC Owner for the application with the local roles and role definitions.
36VIS-AzureApplications-MyResponsibleGrants the ability to see Azure applications for which the person is the responsibility party.
37VIS-AzureApplications-OwnerThis role allows the user to view all Azure applications for which they are the RBAC Owner.
38VIS-BusinessRole-AllGrants access to see all Business Roles.
39VIS-Groups-AllGrants access to see all groups.
40VIS-Location-AllGrants access to see all locations.
41VIS-Management-Role-AllGrants access to see all Management Roles.
42VIS-Management-Role-App-OwnerGrants access to see all Management Roles where the person is an RBAC owner for the application with the Management Roles.
43VIS-Misc-AdminProvides visibility for miscellaneous admin required views.
44VIS-OrgRoleOrgZone-ALLGrants access to see all Business Role and Location combinations.
45VIS-Person-AllGrants access to see all people.
46VIS-Shared-Credential-App-OwnerGrants access to view all Shared Credentials belonging to an application where the person is RBAC Owner.

Azure Claims Mapping Policy Administrator for All Policies and Applications

This role bundle allows users to manage all Azure Claims Mapping Policies for all Azure applications. The role bundle is comprised of the following Management Roles:

View Roles
Management RoleAccess Granted by Management Role
1ACT-Azure-Application-Administration-AllGrants access to create, update, and delete all Azure applications.
2ACT-Azure-Claims-Mapping-Policy-Administration-AllGrants the ability to create, update, and delete all Azure Claims Mapping Policies.
3ACT-Location-Assignment-AllGrants access to operations needed for managing assignments of people to locations.
4UI-Res-Admin-MS-Application-BaseThis is a least privilege role providing access to the Resource Admin UI for managing applications.
5UI-Res-Admin-MS-Application-Claims-Mapping-PolicyProvides access to UI for managing Azure Claims Mapping Policies.
6VIS-Application-AllGrants access to see all applications and subcomponents.
7VIS-AzureApplication-AllGrants access to see all Azure Applications in any tenant.
8VIS-Location-AllGrants access to see all Locations.

Mobile Application and Chatbot User

This role bundle allows users to access the mobile application and chatbot. The role bundle is comprised of the following Management Roles:

View Roles
Management RoleAccess Granted by Management Role
1UI-Mobile-App-Chat-Full-AccessGrants full access to UI, workflows, and APIs for mobile app and chatbot.
2VIS-Mobile-App-APIProvides access to Mobile App and Chatbot API endpoints and methods.