Identity and Access Management (IAM)¶
The Identity and Access Management (IAM) module is the internal security control center of Netsocs Synergy.
It defines what users can do within the platform, regulating access to modules, views, and specific actions.
Netsocs uses an Access Control List (ACL) system to manage platform security and permissions.
Note
IAM differs from the Access Control module:
- IAM → defines what users can do within the software.
- Access Control → regulates physical access to doors, turnstiles, or barriers.
Contents of this section¶
-
Understanding System Permissions
Learn about the fundamental elements that constitute all privileges within the platform. -
Creating and Managing Policies (Roles)
Learn how to group permissions to form reusable roles. -
Managing Users and Assigning Policies
Discover how to create accounts and assign roles securely.
Understanding System Permissions¶
Permissions are the basic building blocks of security in Netsocs Synergy for enabling/disabling functionalities of the different Netsocs modules. Each permission corresponds to a specific and indivisible action within the system.
The Permissions Management section acts as a complete dictionary of all possible actions.
You can review the complete list of permissions in Permission List
Features¶
- Granularity: Each permission is very specific for greater control.
- Clear Nomenclature: Readable format →
module::action(e.g.,accessControl::canCreateDoors). - Indirect Use: Permissions are not assigned to users, but to Policies.
TIP
The permissions view serves as a reference tool: administrators consult it when designing policies.
Examples¶
| Permission Name | Description |
|---|---|
accessControl::canCreatePerson |
Create person records in the Access Control module. |
dashboard::canAddWidgets |
Add widgets to a workspace. |
eventLog::canDeleteEvents |
Delete events from the Event Log. |
Creating and Managing Policies (Roles)¶
A Policy is a set of permissions grouped under a descriptive name.
It represents a job role within the organization (e.g., System Administrator, Level 1 Operator).
The Policies Management section is where these policies are created and managed.
Components of a Policy¶
- Policy Name: Unique role name.
- Description: Brief explanation of its purpose.
- Permissions: List of included permissions.
Procedure to create a Policy¶
- Access Policies → click on
+ Create Policy. - Assign a Name and Description.
- Select relevant permissions from the available list.
- Review and save the configuration.
INFO
Apply the principle of least privilege: grant only strictly necessary permissions.
Managing Users and Assigning Policies¶
In the Users section, all accounts with access to Netsocs Synergy are managed.
Here individual profiles are linked with policies that define their capabilities.
User Management Interface¶
The main view shows a table with registered users:
| Column | Description |
|---|---|
| Username | Unique login identifier (usually an email). |
| Name | User's full name. |
| Assigned Policies | Assigned policies (roles). |
| Edited By | Last administrator who modified the profile. |
| Actions | Options to edit, view, or delete. |
Procedure to create a User¶
- Access Users → click on
+ Create User. - Complete: username, full name, and initial password.
- In the assignment section, select one or more policies.
- Save the profile.
👉 Once created, the user can log in and their actions will be strictly limited by assigned policies.
Example: a user without permission to manage widgets will not see the option to add them.
✅ With the Identity and Access Management (IAM) module, Netsocs Synergy guarantees a robust and flexible security model, aligned with role-based access control (RBAC) best practices.