- 6 minutes to read

Access Management Sidebar Menu Item

On this page, a Nodinite Administrator learns how to navigate and manage the Access Management sub-menu within the Administration sidebar, as seen in the Nodinite Web Client. The 'Access Management' sub-menu is a crucial tool for managing access rights and authorization. The available features depend on your authentication mode.

Take control of your integration environment with Nodinite's Access Management. This feature empowers you to:

✅ Enforce security policies and compliance
✅ Support both Windows and modern cloud-based authentication
✅ Streamline administration with a user-friendly interface
✅ Ensure only authorized users access sensitive data

Nodinite uses Role-based security, a powerful and flexible method for managing access rights. The Managing Nodinite user guide covers this topic in detail—be sure to review it before managing assigned access rights.

Authentication Modes

Nodinite v7 supports two authentication and authorization models:

Windows Authentication Mode

Traditional Windows-based authentication using Active Directory integration.

Authorization Components:

OIDC/OAuth 2.0 Mode

Modern cloud-based authentication using OpenID Connect and OAuth 2.0 protocols.

Authorization Components:

  • Roles - Define permission sets
  • Claims - Key/Value pairs representing permissions or attributes
  • Policies - Groups of Claims assigned to Roles

Tip

To configure OIDC/OAuth 2.0 authentication, see Install Nodinite v7 - OpenID Connect (OIDC) and OAuth 2.0. For Azure AD (Entra ID) setup, see Register Nodinite Applications in Azure AD.

Access Management sidebar menu
As a Nodinite Administrator, you have access to the 'Access Management' menu in the Nodinite Web Client. The available menu items depend on your authentication mode.

Windows Authentication Mode

When using Windows authentication, you have access to:

  1. Manage Roles
  2. Manage Users
  3. Manage Windows AD Groups

OIDC/OAuth 2.0 Mode

When using OIDC/OAuth 2.0 authentication, you have access to:

  1. Manage Roles
  2. Manage Claims
  3. Manage Policies

Frequently Asked Questions

Which authentication mode should I use?

Windows Authentication when:

  • You have on-premises deployment with Active Directory
  • All users are within your Windows domain/forest
  • You prefer traditional Windows-integrated security

OIDC/OAuth 2.0 when:

  • You have cloud-based deployments (Azure, AWS, etc.)
  • You want to integrate with external identity providers (Azure AD, Okta, etc.)
  • You need cross-platform authentication
  • You require modern security protocols

What's the difference between Users/Groups and Claims/Policies?

Windows Mode (Users & Groups):

  • Direct mapping to Windows domain accounts and AD security groups
  • Authentication and authorization handled by Windows
  • Best for on-premises deployments

OIDC/OAuth 2.0 Mode (Claims & Policies):

  • Flexible key/value pairs (Claims) grouped into Policies
  • Works with any OpenID Connect compliant identity provider
  • Better for cloud and multi-platform deployments

What's the difference between Users and Windows AD Groups?

Note

This applies to Windows Authentication mode only.

Users are individually managed accounts within Nodinite. Use when:

  • You have external users (partners, vendors) not in your AD
  • You need fine-grained control over specific individuals
  • You don't have Active Directory integration

Windows AD Groups leverage your exist-ng AD infrastructure. Use when:-

  • You want automatic provisioning based on AD group membershi-
  • You need to maintain access control in one place (AD)
  • You have many users with similar permissions

What's the difference between Claims and Policies?

Note

This applies to OIDC/OAuth 2.0 mode only.

Claims are individual key/value pairs representing specific permissions or attributes:

  • Example: department = finance, access_level = admin
  • Building blocks for authorization
  • Provided by your identity provider or configured in Nodinite

Policies are groups of Claims that can be assigned to Roles:

  • Example: "Finance Admin Policy" contains multiple Claims
  • Simplifies management by grouping related permissions
  • Assigned to Roles just like Users/Groups in Windows mode

Can one user have multiple roles?

Yes! Users can be assigned multiple Roles, and permissions are cumulative. For example:

  • User assigned to "Business User" role gets read access
  • Same user assigned to "Developer" role gets Repository Model access
  • User has both sets of permissions

How do I revoke access quickly in an emergency?

Options:

  1. Disable the User - Immediate access revocation
  2. Remove Role assignment - Remove specific permissions
  3. Modify the Role - Change what all role members can access

What's the principle of least privilege?

Grant users only the minimum permissions needed for their job function. For example:

  • Business users: Access to their Log Views only, not all integrations
  • Developers: Test/Dev environment access, not Production
  • Operations: Full monitoring access, but no configuration changes

How do I audit who has access to what?

Use Log Audits to track:

  • Who accessed which Log Views
  • Who performed configuration changes
  • Who executed Remote Actions
  • When permissions were modified

How do I add a Role?

Read and follow the instructions in this user guide: Add or manage Role.

How do I add a User?

Read and follow the instructions in this user guide: Add or manage User.

How do I add a Windows AD Group?

Read and follow the instructions in this user guide: Add or manage Windows AD Group.

How do I add a Claim?

Note

This applies to OIDC/OAuth 2.0 mode only.

Read and follow the instructions in this user guide: Add or manage Claim.

How do I add a Policy?

Note

This applies to OIDC/OAuth 2.0 mode only.

Read and follow the instructions in this user guide: Add or manage Policy.

How do I allow a User access to work with Log Views?

Read and follow the instructions in this user guide: Log View permission set.

How do I allow a User access to work with Monitor Views?

Read and follow the instructions in this user guide: Monitor View permission set.

How do I allow a User access to work with the Repository Model?

Read and follow the instructions in this user guide: Repository Model permission set.

Next Step

Windows Authentication Mode:

Add or manage Role
Add or manage User
Add or manage Windows AD Group

OIDC/OAuth 2.0 Mode:

Add or manage Role
Add or manage Claim
Add or manage Policy

Access Management Components:

Roles – Define permission sets
Roles Overview – Manage all roles
Users – Manage user accounts (Windows mode)
Users Overview – User administration
Windows AD Groups – Active Directory integration (Windows mode)
Windows AD Groups - Overview – AD group management
Claims – Key/value authorization attributes (OIDC/OAuth 2.0 mode)
Claims Overview – Manage all claims
Policies – Groups of Claims (OIDC/OAuth 2.0 mode)
Policies Overview – Manage all policies

Permission Sets:

Permission Set for Log Views – Grant Log View access
Permission Set for Monitor Views – Grant Monitor View access
Permission Set for the Repository Model – Grant Repository access

Related Features:

Log Audits – Track user activity and changes
Log Views – What Roles can grant access to
Monitor Views – Monitoring with role-based access
Remote Actions – Permissions for self-service operations
Repository Model – Integration documentation access

Administration:

Administration – Main administration overview
Web Client – User interface
Install Nodinite v7 - OpenID – Configure OIDC/OAuth 2.0 authentication
Install Nodinite v7 - OpenID - EntraID – Azure AD (Entra ID) setup guide