RBAC
RBAC: Role-Specific User & Authority Management
Deliver role-specific screens to your users and maintain end-to-end control over data access with RBAC-driven user & permission management.
User & Permissions Management
Role Hierarchy
System Administrator
All modules · Full access
Admin
Operations Manager
Field modules · Read + Write
Manager
Field Technician
Assigned tasks · Read only
Operator
RBAC
Problem & Solution
CURRENT STATE
Unmanaged Access
Universal Visibility: Every user sees the same screens; sensitive data is exposed to everyone.
IT Dependency: Granting permissions for new hires relies on manual IT tickets.
Security Gaps: Access for departed employees remains active, awaiting manual closure.
Data Overlap: Departments can access each other's confidential data.
Compliance Failure: Who accessed what?" remains unanswered during audits.

WITH CHEETAH
User & Permission Management (RBAC)
Role-Specific Views: Custom screen designs for every role; sensitive data is automatically masked.
No-Code Permissions: Authorization is configured in minutes without requiring IT support.
Instant Offboarding: User deactivation is managed instantly with a single click.
Automated Data Isolation: Data separation is strictly rule-based and automated.
Audit-Ready Logs: Full access history and comprehensive reports are ready for compliance audits.
Feature Benefits
Eliminate Operational Complexity
through User & Authority Control
Role-Based Screen
Design
Despite investments in ITAM, Discovery, and CMDB, organizations often struggle to reconcile active network devices with inventory records.
Role-Based Access
Data Access
Control
Define data access down to the row and column level. Two users on the same screen can see entirely different data sets based on their permissions.
Data Security
Custom Permission Definitions
Build your own authorization model when standard roles aren’t enough. Create user & authority management (RBAC) layers customized by department, position, location, or project.
Customizable
Step-by-Step
How It Works?
Define
Roles
Create your role hierarchy with a drag-and-drop interface. Admin, manager, operator—add as many layers as you need.
Assign Permissions
Determine exactly which modules, screens, and data fields are visible for each specific role.
Deploy to
Users:
Assign permissions to individuals or groups in bulk. All changes take effect instantly.
Monitor &
Update
View access logs and revise permissions as needed. Automatically generate audit-ready reports.
Implementation Scenarios
Who Benefits from User & Authority Management?
IT Manager
Enterprise Organizations
I defined specific permission sets for every department in the onboarding process. Now, line managers manage their own teams—no more manual IT tickets.
Reduced IT Workload
Operations Manager
Multi-Location Companies
Teams in different locations only see data related to their own sites. Data clutter and confusion are finally over.
Established Data Discipline
CISO / Information Security
Compliance (GDPR & ISO 27001)
During an audit, I answered ‘who accessed what’ in minutes. The entire access history is fully logged and secure.
Simplified Audit Readiness
F.A.Q
Frequently Asked Questions
What is Authority Management?
Authority management is the process of defining and controlling which users can access specific data, screens, and operations within a software or platform. In enterprise applications, it serves as the foundation of data security and operational discipline, primarily through RBAC (Role-Based Access Control). By using this model, organizations can ensure that access rights are granted based on specific roles rather than individual users, streamlining both security and efficiency.
What is the difference between Role-Based Access Control (RBAC) and Custom Auhority Definitions?
RBAC assigns users to predefined roles and grants permissions through these roles. Custom auhority definitions, on the other hand, allow you to create specific combinations tailored to your unique business processes, going beyond standard role structures.
How long does it take to change permissions on the Cheetah Platform?
Changing a user’s permission takes only minutes. Changes take effect instantly, requiring no platform restart or IT intervention.
How is access revoked when a user leaves?
A single click is enough to deactivate a user account. Access is revoked instantly, while all past activities remain securely logged and archived.
Is permission management sufficient for GDPR (KVKK) and ISO 27001 compliance?
Permission management is one of the core requirements of these standards. Cheetah’s access logging and audit reporting features directly support GDPR (KVKK) and ISO 27001 compliance processes.
How many different roles can I define?
Unlimited. You can create as many role hierarchies as you need based on department, position, project, or location.
Does authority management work integrated with other Cheetah features?
Yes. It is fully integrated with the Workflow Engine, SLA Management, and Reporting modules. A user’s permissions are reflected consistently across the entire platform.
Contact Us
Digital Transformation Take Your Business Processes into the Future!
Contact us for digital solutions tailored to your business processes.
Let us analyse your needs and draw up a clear roadmap.