{"id":13726,"date":"2022-02-23T11:51:53","date_gmt":"2022-02-23T10:51:53","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=13726"},"modified":"2023-03-14T13:50:39","modified_gmt":"2023-03-14T12:50:39","slug":"authorisation-concept-best-practice","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2022\/02\/23\/authorisation-concept-best-practice\/","title":{"rendered":"Authorisation concept: Best practice recommendations"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kkwbho9e-2d2e96402cb086654b12ea4ba944e647\">\n.avia-section.av-kkwbho9e-2d2e96402cb086654b12ea4ba944e647{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-kkwbho9e-2d2e96402cb086654b12ea4ba944e647 .av-section-color-overlay{\nopacity:0.3;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-kkwbho9e-2d2e96402cb086654b12ea4ba944e647 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_px='500'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:500px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-bjkpou-4d21ae85a694f724a081997bbbff889f main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9r4r66-90380a229f4631b5c0d2990376471ae0\">\n.flex_column.av-9r4r66-90380a229f4631b5c0d2990376471ae0{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9r4r66-90380a229f4631b5c0d2990376471ae0 av_four_fifth  avia-builder-el-2  el_before_av_four_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yzy6la-affb8122b31e76e7fc595d8ed5e7d785\">\n#top .av-special-heading.av-1yzy6la-affb8122b31e76e7fc595d8ed5e7d785{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1yzy6la-affb8122b31e76e7fc595d8ed5e7d785 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1yzy6la-affb8122b31e76e7fc595d8ed5e7d785 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1yzy6la-affb8122b31e76e7fc595d8ed5e7d785 av-special-heading-h1 blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Authorisation concept: Best practice recommendations<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-4  el_after_av_four_fifth  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>An omnipresent topic for companies is the question of IT security. Which employees really need access to certain sectors and (sensitive) data? What does effective protection against sabotage or hacker attacks look like?<\/p>\n<p>The German Federal Office for Information Security (german: BSI) recommends that critical infrastructures (CRITIS) have access controls &#8211; physical and logical &#8211; among other things. A suggestion that is also relevant for companies without KRITIS classification.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ypsa6-796b7cf34a7baf184f7ec536d1266901\">\n.avia-section.av-6ypsa6-796b7cf34a7baf184f7ec536d1266901{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_566877226-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-6ypsa6-796b7cf34a7baf184f7ec536d1266901 .av-section-color-overlay{\nopacity:0.9;\nbackground-color:#262626;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-6ypsa6-796b7cf34a7baf184f7ec536d1266901 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-6  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-7  el_before_av_three_fourth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>With a view to IT security, an authorisation concept is therefore needed that makes access comprehensible, protects against internal and external attacks and at the same time supports IT administration in a resource-saving way. What aspects should you consider when designing such a concept?<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-9  el_after_av_three_fourth  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><div  class='avia-icon-list-container av-kzpah58q-d2c18cb1f8a407a736c69c3cb285e35c  avia-builder-el-10  avia-builder-el-no-sibling '><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-kzpah58q-d2c18cb1f8a407a736c69c3cb285e35c avia-iconlist-animate'>\n<li><div class='iconlist_icon av-1n443a6-79b16ea073be312423e21aaba3af934f avia-font-entypo-fontello'><span class='iconlist-char' aria-hidden='true' data-av_icon='\ue879' data-av_iconfont='entypo-fontello'><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Establish formal processes\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Establish formal processes<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>How do employees obtain new authorisations? And how are authorisations handled when employees leave the company or the department? Establish a formal process that regulates the allocation of authorisations and how these are documented. Check whether additional measures, such as protective instructions, are necessary for highly sensitive data.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-1a0zsam-73a5c2e2baf3bbf78c85194a0f5aff28 avia-font-entypo-fontello'><span class='iconlist-char' aria-hidden='true' data-av_icon='\ue879' data-av_iconfont='entypo-fontello'><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Designate responsible persons\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Designate responsible persons<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Assign responsibility for access rights to (sensitive) data to authorised persons. These persons formally decide which employees need access, following the need-to-know principle. Only after approval by these persons are the authorisations technically implemented.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-mokari-e7722a44a10773e431c04a13619d7e47 avia-font-entypo-fontello'><span class='iconlist-char' aria-hidden='true' data-av_icon='\ue879' data-av_iconfont='entypo-fontello'><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Permissions at directory level and via AD groups\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Permissions at directory level and via AD groups<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Avoid granting permissions to individual files. Instead, use a directory level where full access is not granted if possible. Aim for authorisation management via AD groups instead of favouring individual users. In combination with authorisation hierarchies that are as flat as possible, this ensures administrability.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='av_section_4'  class='avia-section av-6ypsa6-b7c576416f766340c626410366962509 main_color avia-section-default avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-12  el_before_av_one_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Three best practice steps that your authorisation concept should include. But before you establish this in your company, it is worth taking a look at your current authorisation structure. Check: Are there historically grown authorisation structures?<\/p>\n<p>Large amounts of unstructured data accumulate in the form of documents and files and the file server structure is becoming increasingly unclear. Who has which authorisations? If there is no overview, a security gap is created.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Reasons for an opaque authorisation structure can be:<\/p>\n<ul>\n<li>Restructuring within the organisation<\/li>\n<li>Change of technical platform, persons and areas of responsibility<\/li>\n<li>Manual errors in the allocation of authorisations<\/li>\n<li>Permanent manifestation of provisional interim solutions<\/li>\n<li>Missing documentation or documentation that deviates from the technical conditions<\/li>\n<li>Changing requirements for data access<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-85b3d8d408f80152e13fe296657fc778\">\n.flex_column.av-bcmscg-85b3d8d408f80152e13fe296657fc778{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-85b3d8d408f80152e13fe296657fc778 av_one_fifth  avia-builder-el-15  el_after_av_four_fifth  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzhx2q-a3ae57825f4181aa758484e64581c229\">\n.avia-section.av-lzhx2q-a3ae57825f4181aa758484e64581c229{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/07\/shutterstock_393482614-scaled.jpg);\nbackground-position:0% 0%;\nbackground-attachment:scroll;\n}\n.avia-section.av-lzhx2q-a3ae57825f4181aa758484e64581c229 .av-section-color-overlay{\nopacity:0.9;\nbackground-color:#262626;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-lzhx2q-a3ae57825f4181aa758484e64581c229 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-16  el_after_av_section  el_before_av_four_fifth  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085\">\n.flex_column.av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085 av_four_fifth  avia-builder-el-17  el_before_av_hr  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p><article  class='iconbox iconbox_left av-kycqot8c-862075a27b15d09628b75b438de0aa6f  avia-builder-el-18  el_before_av_hr  avia-builder-el-first '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Good to know\"><div class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue864' data-av_iconfont='entypo-fontello'><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >Good to know<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>The analysis tool <a href=\"https:\/\/www.accessmanager.net\/en\/modules-features\/modules\/#ntfs_permissionanalyzer\" target=\"_blank\" rel=\"noopener\">NTFS Permission Analyzer<\/a> helps you to determine the current ACTUAL state of the NTFS permission situation on your file servers. Especially if you are confronted with historically grown permission structures, a file server migration is pending or a restructuring of the file servers is to be carried out, the NTFS Permission Analyzer is a reliable tool to gain an overview in a simple way.<\/p>\n<p>At the same time, the NTFS Permission Analyzer also prepares the first step on the way to future automated authorisation management via the Access Manager.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kzzfrq8z-3a05cc84711d61bd7a7b675388932f03\">\n#top .hr.hr-invisible.av-kzzfrq8z-3a05cc84711d61bd7a7b675388932f03{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kzzfrq8z-3a05cc84711d61bd7a7b675388932f03 hr-invisible  avia-builder-el-19  el_after_av_icon_box  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-kzzfrbpe-d40fcc2feece00080c8b08576171c345-wrap avia-button-center  avia-builder-el-20  el_after_av_hr  avia-builder-el-last '><a href='https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/'  class='avia-button av-kzzfrbpe-d40fcc2feece00080c8b08576171c345 av-link-btn avia-icon_select-no avia-size-x-large avia-position-center avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"test now for free\"><span class='avia_iconbox_title' >test now for free<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kycs5lns-ad3b887d00633045238d1b91fe0d3eba\">\n#top .hr.hr-invisible.av-kycs5lns-ad3b887d00633045238d1b91fe0d3eba{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-kycs5lns-ad3b887d00633045238d1b91fe0d3eba hr-invisible  avia-builder-el-21  el_after_av_four_fifth  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='after_section_5'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-22  el_after_av_section  el_before_av_two_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kzzfkhi7-8736c99045a3edb1f9f24d65f1abf254\">\n#top .av-special-heading.av-kzzfkhi7-8736c99045a3edb1f9f24d65f1abf254{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-kzzfkhi7-8736c99045a3edb1f9f24d65f1abf254 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kzzfkhi7-8736c99045a3edb1f9f24d65f1abf254 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-kzzfkhi7-8736c99045a3edb1f9f24d65f1abf254 av-special-heading-h3 blockquote modern-quote  avia-builder-el-23  el_before_av_textblock  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Implement the authorisation concept: Which software tool supports you in which way?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The secure administration of authorisations succeeds with a software solution that supports the IT administration. This is the only way to establish authorisation allocation in the long term,<\/p>\n<p>To what extent a software solution should support the creation of a new concept is a decision for the administration. When making a choice, it helps to clarify internally: What level of support do we want to use and how much should be implemented automatically in the future? You have the choice between tools for the simple evaluation of the existing situation up to a fully comprehensive automated authorisation management, which are specifically aimed at end users and data managers.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1dm0f1u-6d53e02631268afdabebc1cf4adb69d1\">\n.flex_column.av-1dm0f1u-6d53e02631268afdabebc1cf4adb69d1{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1dm0f1u-6d53e02631268afdabebc1cf4adb69d1 av_two_fifth  avia-builder-el-25  el_after_av_four_fifth  el_before_av_two_fifth  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kzy9yihq-8b7faba4a6118328311ec1aeb810f09f\">\n#top .hr.hr-invisible.av-kzy9yihq-8b7faba4a6118328311ec1aeb810f09f{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kzy9yihq-8b7faba4a6118328311ec1aeb810f09f hr-invisible  avia-builder-el-26  el_before_av_image  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kzy9x8cb-130e91dac538521d4f3b958970a2dfcf\">\n.avia-image-container.av-kzy9x8cb-130e91dac538521d4f3b958970a2dfcf img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kzy9x8cb-130e91dac538521d4f3b958970a2dfcf .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kzy9x8cb-130e91dac538521d4f3b958970a2dfcf av-styling- avia-align-center  avia-builder-el-27  el_after_av_hr  avia-builder-el-last '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-13713 avia-img-lazy-loading-not-13713 avia_image ' src=\"https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-scaled.jpg\" alt='' title='shutterstock_569209462'  height=\"1815\" width=\"2560\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-scaled.jpg 2560w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-300x213.jpg 300w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-1030x730.jpg 1030w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-768x544.jpg 768w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-1536x1089.jpg 1536w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-2048x1452.jpg 2048w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-1500x1063.jpg 1500w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-260x185.jpg 260w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_569209462-705x500.jpg 705w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/div><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-85b3d8d408f80152e13fe296657fc778\">\n.flex_column.av-bcmscg-85b3d8d408f80152e13fe296657fc778{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-85b3d8d408f80152e13fe296657fc778 av_two_fifth  avia-builder-el-28  el_after_av_two_fifth  el_before_av_section  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The technical implementation is carried out completely via the system, so that no IT background knowledge is required for use. In this way, authorisations can be granted in a user-friendly and comprehensible way by means of self-service.<\/p>\n<p>The aim of automated authorisation allocation by means of self-service is to shift the responsibility for and processing of authorisation processes away from IT administrators to the data managers. Only if authorisations are no longer granted &#8220;bypassing the system&#8221;, but via the application and release workflows provided for this purpose, can the defined target state be maintained in the long term.<\/p>\n<\/div><\/section><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-o4wajm-0a0f85ac952c99f9056b8cfcfce52136\">\n.avia-section.av-o4wajm-0a0f85ac952c99f9056b8cfcfce52136{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/07\/shutterstock_587192849-1-scaled-1.jpg);\nbackground-position:0% 0%;\nbackground-attachment:scroll;\n}\n.avia-section.av-o4wajm-0a0f85ac952c99f9056b8cfcfce52136 .av-section-color-overlay{\nopacity:0.9;\nbackground-color:#262626;\n}\n<\/style>\n<div id='av_section_6'  class='avia-section av-o4wajm-0a0f85ac952c99f9056b8cfcfce52136 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-30  el_after_av_two_fifth  avia-builder-el-last  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-13726'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ttizf6-1411a0b9ae1746af6c751737a40ce45c\">\n.flex_column.av-ttizf6-1411a0b9ae1746af6c751737a40ce45c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-ttizf6-1411a0b9ae1746af6c751737a40ce45c av_four_fifth  avia-builder-el-31  el_before_av_hr  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><div  class='av_promobox av-kp6yhpxv-8bf7c78592631948489d6173cd2b3415 avia-button-yes  avia-builder-el-32  avia-builder-el-no-sibling '><div class='avia-promocontent'><p>\nYou would like to get to know the BAYOOSOFT Access Manager directly?<\/p>\n<p>The automated and secure self-service solution supports you in authorisation management and offers you the right tool for NTFS analysis.<\/p>\n<p>Sign up for a 30-day TRIAL.<\/p>\n<\/div><div  class='avia-button-wrap av-kp6yhpxv-6841c667198292647a26f59b71a9e19e-wrap avia-button-right '><a href='https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/'  class='avia-button av-kp6yhpxv-6841c667198292647a26f59b71a9e19e av-link-btn avia-icon_select-no avia-size-large avia-position-right avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"test now\"><span class='avia_iconbox_title' >test now<\/span><\/a><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kycs1fuq-1236ef096d83a54c13bc8d470460e85a\">\n#top .hr.hr-invisible.av-kycs1fuq-1236ef096d83a54c13bc8d470460e85a{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-kycs1fuq-1236ef096d83a54c13bc8d470460e85a hr-invisible  avia-builder-el-33  el_after_av_four_fifth  el_before_av_four_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085\">\n.flex_column.av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085 av_four_fifth  avia-builder-el-34  el_after_av_hr  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><div  class='av-social-sharing-box av-kycs2gae-1c01bccdc8226c312a7b17ed38095dcf av-social-sharing-box-minimal  avia-builder-el-35  avia-builder-el-no-sibling  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Sounds interesting? Share our post<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.accessmanager.net\/en\/2022\/02\/23\/authorisation-concept-best-practice\/&#038;t=Authorisation%20concept%3A%20Best%20practice%20recommendations' aria-hidden='false' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-whatsapp' ><a target=\"_blank\" aria-label=\"Share on WhatsApp\" href='https:\/\/api.whatsapp.com\/send?text=https:\/\/www.accessmanager.net\/en\/2022\/02\/23\/authorisation-concept-best-practice\/' aria-hidden='false' data-av_icon='\uf232' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on WhatsApp'><span class='avia_hidden_link_text'>Share on WhatsApp<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Authorisation%20concept%3A%20Best%20practice%20recommendations&#038;url=https:\/\/www.accessmanager.net\/en\/2022\/02\/23\/authorisation-concept-best-practice\/' aria-hidden='false' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Authorisation%20concept%3A%20Best%20practice%20recommendations&#038;body=https:\/\/www.accessmanager.net\/en\/2022\/02\/23\/authorisation-concept-best-practice\/' aria-hidden='false' data-av_icon='\ue805' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":42,"featured_media":13710,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-13726","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial-en"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/13726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=13726"}],"version-history":[{"count":15,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/13726\/revisions"}],"predecessor-version":[{"id":16234,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/13726\/revisions\/16234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/13710"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=13726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=13726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=13726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}