Delegating relieves

... and makes digital processes more secure.

Delegated administration for network structures

– simple, efficient, fast and secure.

There are many tasks involved in assigning and managing access rights. Even if many approval processes nowadays run via workflows, there is still a lot to do. A central administrator is overloaded and is slow to process pending changes and tasks.

A user who is no longer an employee or member of an organization can represent a weak point in security. This is also the case if they change their position or status. A delegated administrator can counteract this, as he is closer to this user and therefore up to date. He can remove access rights from “leavers” as well as maintain changes more promptly and better. He also understands the needs of the users managed by him. Therefore, he provides them with better support.

Networks require distributed administration of users

Collaboration and cooperation continue to grow together in the digitalized world. For example, there are many online services that are accessed not only by traditional employees, but also by customers, business partners and other external third parties. Associations, clubs and franchise companies are increasingly digitizing their services for members, who need the delegated administration function.

We have developed Delegated Administration in Login-Master precisely for these cases. And it is just as flexible as today’s structures require.

Securely manage grown subunits

Clubs per se already have a substructure (departments) in which their members are distributed. Companies and associations are increasingly digitizing and connecting external users with their online services or projects that they map digitally. The external users are usually not located in a flat hierarchy. There are also external structures that represent these relationships.

Just as a department head manages the members of his department, a delegated administrator can manage the users of his area. These can be account managers for B2B customers or buyers who manage a strategic area with suppliers. The list can be continued indefinitely because these constellations exist almost everywhere.

This type of identity administration exists so that organizations can securely manage the users of such “sub-areas”.

Delegated administration – how it works:

The assignment of access rights to external or internal third parties affects three places:

Administrator

Grants delegated administrator rights

Delegated administrator

Grants access rights to colleagues, members or customers at local level.

Administered users

Users managed by the delegated administrator have access to the network of the business partner, association or provider.

We implement “Delegated Administration” individually according to customer specifications using the SecuRole® role framework. The responsible central administrator defines the role of the “Delegated Administrator”. This in turn manages the list of users for whom he is authorized. A delegated administrator can assign or revoke roles to the members of their area.

Delegated administration

– how we implement this with Login-Master:

Introduction

Our customers map the rights structure and assignment of users to areas on their own or with us. If the access rights of your own employees are included, you can use existing organizational charts as a guide. We then define the positions of the delegated administrators with their own rights and duties as well as the area with users for which they are responsible.

Mapping the structure

  • We map the structure of the delegated administration, the associated applications and roles in the system as part of the implementation project (configuration frontend + backend).
  • Introduction of the SecuRole® authorization framework for the secure transfer of access authorizations.

Support & Security

After the introduction of Delegated Administration, we or our customer can make changes / add or delete further delegated administrators within the defined relationship structure. A monitoring system monitors login and other IAM-relevant activities of the delegated administrators.

Many people don’t even know that they need delegated administration.

We will show you what you can do to map access rights in established structures and networks for your Web-based applications.

Contact us!

    Subject *

    Name *

    E-Mail *

    Telephone

    Company

    Message *

    Please insert text captcha

    Please prove you are human by selecting the tree.

    I hereby agree that Syntlogo GmbH and/or intension GmbH may contact me by telephone, e-mail or post. I am aware that I can revoke this consent at any time with effect for the future, by e-mail to info@syntlogo.de or via this contact form. We inform you that the revocation of your consent does not affect the legality of the processing carried out on the basis of the consent until revocation. Our privacy policy.

    Improve your user satisfaction and relieve your support.