Skip to main content

Cyware Threat Intelligence eXchange

Onboard Users

The role-based access control (RBAC) helps CTIX admins to define and manage user access to features or data based on the users' role in the CTIX platform.

You can set varying levels of permissions to enable access to authorized users based on their roles and responsibilities. This protects sensitive data and ensures users of the threat intel operations teams can only access the required information.

For example, you can categorize all CTIX users into Administrators or Limited Access groups. Analysts have access to threat intel features and administrators have access to configuration features.

You can also configure your users' access to perform only a few actions or all actions for a feature. For example, you can configure a section of users to only view dashboards while the creation or editing of dashboard permissions rests with another section of users.

In addition to configuring user roles, access control also helps you to adhere to any data protection protocols or policies within your organization by restricting users' access to extremely sensitive data. You can achieve this by hiding one or more features completely from a set of users.