BECS Role-based Security


Within an organization's enterprise systems security, roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users.

The pictures below describes the general principle of RBAC and IMS usage in BECS:

    

BECS has implemented the role-based security with easy configuration of permissions and specific roles for relevant BECS integration projects. In the video below you can see how it works in practice: