Skip to content

Access

Under the Access configuration pages, organizations setup

  • Users,
  • Roles, and
  • API Tokens.

The navigation path is Configuration | Access.

img

Why Configure Access

Proper access configuration is fundamental to maintaining a secure and well-governed Hydden implementation. By strategically managing user accounts, assigning role-based permissions, and provisioning API tokens, organizations can:

  • Enforce the Principle of Least Privilege: Ensure users and applications only have access to the specific resources and data they need to perform their responsibilities, reducing the attack surface and limiting the impact of compromised credentials.
  • Enable Audit and Compliance: Maintain detailed audit trails of who accessed what data and when, supporting regulatory compliance requirements and security investigations.
  • Support Organizational Governance: Align system access with organizational structure and job functions, enabling segregation of duties and preventing unauthorized actions.
  • Facilitate Secure Automation: Issue and manage API tokens for programmatic integrations and automated workflows, enabling secure system-to-system communication without sharing user credentials.
  • Streamline Offboarding: Quickly revoke access when users leave the organization or change roles, preventing unauthorized access by former employees or those outside their new responsibilities.

Hydden Documentation and Training Hub