Role-Based Access Control
A security mechanism that restricts system access based on the roles assigned to individual users within an organization.
RBAC in BasaltHQ goes beyond simple "admin/user" distinctions. The system supports hierarchical role inheritance, attribute-based policies, and dynamic permissions that change based on context. A regional sales manager can view all deals in their territory but cannot access HR records. A compliance officer can audit any module's logs but cannot modify data. An AI agent inherits the permissions of the user who invoked it, ensuring that automated actions never exceed the authority of their human principal. BASALTONYX continuously monitors role assignments for segregation-of-duty violations.
Related Concepts
See also:
Zero-Trust Architecture
A security model that requires strict identity verification for every person and device attempting to access resources, regardless of their network location.
See also:
Data Sovereignty
The principle that data is subject to the laws and governance structures of the nation or organization where it is collected or stored.
See also:
Audit Trail
An immutable, chronological record of every action, decision, and data access event within an enterprise system.