Skip to main content

ThreatKey provides advanced access management capabilities to control user permissions. Key features include:

  • Role-based access control (RBAC)
  • Granular privileges
  • Hierarchical group permissions
  • Active directory integration
  • Audit logging

Role-based access control (RBAC)

RBAC enables creating roles that bundle appropriate privileges. You can assign users to roles that match their responsibility.

For example, an "Analyst" role combines analytics and reporting privileges. RBAC simplifies access management as user needs change.


Granular privileges give detailed control over features and data access. Custom roles can have a mix of privileges.

Example privileges:

  • Manage users
  • Access misconfiguration data
  • Change configurations
  • Export reports

Align privileges to user responsibilities. Remove excessive access to reinforce least privilege principles.


Permission schemes can be applied at the group level. Users inherit permissions from their groups.

Groups allow managing access for organizations or teams via inheritance. Permissions can be tailored at the group or user level.

Audit logging

Audit logging provides visibility into access and changes. Logs can be exported for analysis or compliance. File a support ticket to request audit logs.