Authorization defines what a user can access or perform after successful authentication

User Authorization Capabilities

Access to limited Network

Certain Resources/Servers

Access from Certain Routers

Allowed Time of the day

Only Particular Security Protocol

Only Particular Vendor’s  Router

Only from Particular Device

Only using Particular MFA

Access Control Profiles

Real-Time Profile builder

IP Address Specific Profiles

Role Based Profile

Vendor Specific Profiles

Group Based Profile

Attribute/Value based building Tools

Centralized Administration

  • Role of Administrator
  • Access Permission of User
  • Selection of MFA
  • Selection of Access Points
  • Selection of Vendor Specific Feature
  • Assignment of Profile
  • All changes are Localized