Access Management Sidebar Menu Item
On this page, a Nodinite Administrator learns how to navigate and manage the Access Management sub-menu within the Administration sidebar, as seen in the Nodinite Web Client. The 'Access Management' sub-menu is a crucial tool for managing access rights and authorization. The available features depend on your authentication mode.
Take control of your integration environment with Nodinite's Access Management. This feature empowers you to:
✅ Enforce security policies and compliance
✅ Support both Windows and modern cloud-based authentication
✅ Streamline administration with a user-friendly interface
✅ Ensure only authorized users access sensitive data
Nodinite uses Role-based security, a powerful and flexible method for managing access rights. The Managing Nodinite user guide covers this topic in detail—be sure to review it before managing assigned access rights.
Authentication Modes
Nodinite v7 supports two authentication and authorization models:
Windows Authentication Mode
Traditional Windows-based authentication using Active Directory integration.
Authorization Components:
- Roles - Define permission sets
- Users - Individual Windows domain accounts
- Windows AD Groups - Active Directory security groups
OIDC/OAuth 2.0 Mode
Modern cloud-based authentication using OpenID Connect and OAuth 2.0 protocols.
Authorization Components:
- Roles - Define permission sets
- Claims - Key/Value pairs representing permissions or attributes
- Policies - Groups of Claims assigned to Roles
Tip
To configure OIDC/OAuth 2.0 authentication, see Install Nodinite v7 - OpenID Connect (OIDC) and OAuth 2.0. For Azure AD (Entra ID) setup, see Register Nodinite Applications in Azure AD.

As a Nodinite Administrator, you have access to the 'Access Management' menu in the Nodinite Web Client. The available menu items depend on your authentication mode.
Sub-menu Items
Windows Authentication Mode
When using Windows authentication, you have access to:
OIDC/OAuth 2.0 Mode
When using OIDC/OAuth 2.0 authentication, you have access to:
Frequently Asked Questions
Which authentication mode should I use?
Windows Authentication when:
- You have on-premises deployment with Active Directory
- All users are within your Windows domain/forest
- You prefer traditional Windows-integrated security
OIDC/OAuth 2.0 when:
- You have cloud-based deployments (Azure, AWS, etc.)
- You want to integrate with external identity providers (Azure AD, Okta, etc.)
- You need cross-platform authentication
- You require modern security protocols
What's the difference between Users/Groups and Claims/Policies?
Windows Mode (Users & Groups):
- Direct mapping to Windows domain accounts and AD security groups
- Authentication and authorization handled by Windows
- Best for on-premises deployments
OIDC/OAuth 2.0 Mode (Claims & Policies):
- Flexible key/value pairs (Claims) grouped into Policies
- Works with any OpenID Connect compliant identity provider
- Better for cloud and multi-platform deployments
What's the difference between Users and Windows AD Groups?
Note
This applies to Windows Authentication mode only.
Users are individually managed accounts within Nodinite. Use when:
- You have external users (partners, vendors) not in your AD
- You need fine-grained control over specific individuals
- You don't have Active Directory integration
Windows AD Groups leverage your exist-ng AD infrastructure. Use when:-
- You want automatic provisioning based on AD group membershi-
- You need to maintain access control in one place (AD)
- You have many users with similar permissions
What's the difference between Claims and Policies?
Note
This applies to OIDC/OAuth 2.0 mode only.
Claims are individual key/value pairs representing specific permissions or attributes:
- Example:
department=finance,access_level=admin - Building blocks for authorization
- Provided by your identity provider or configured in Nodinite
Policies are groups of Claims that can be assigned to Roles:
- Example: "Finance Admin Policy" contains multiple Claims
- Simplifies management by grouping related permissions
- Assigned to Roles just like Users/Groups in Windows mode
Can one user have multiple roles?
Yes! Users can be assigned multiple Roles, and permissions are cumulative. For example:
- User assigned to "Business User" role gets read access
- Same user assigned to "Developer" role gets Repository Model access
- User has both sets of permissions
How do I revoke access quickly in an emergency?
Options:
- Disable the User - Immediate access revocation
- Remove Role assignment - Remove specific permissions
- Modify the Role - Change what all role members can access
What's the principle of least privilege?
Grant users only the minimum permissions needed for their job function. For example:
- Business users: Access to their Log Views only, not all integrations
- Developers: Test/Dev environment access, not Production
- Operations: Full monitoring access, but no configuration changes
How do I audit who has access to what?
Use Log Audits to track:
- Who accessed which Log Views
- Who performed configuration changes
- Who executed Remote Actions
- When permissions were modified
How do I add a Role?
Read and follow the instructions in this user guide: Add or manage Role.
How do I add a User?
Read and follow the instructions in this user guide: Add or manage User.
How do I add a Windows AD Group?
Read and follow the instructions in this user guide: Add or manage Windows AD Group.
How do I add a Claim?
Note
This applies to OIDC/OAuth 2.0 mode only.
Read and follow the instructions in this user guide: Add or manage Claim.
How do I add a Policy?
Note
This applies to OIDC/OAuth 2.0 mode only.
Read and follow the instructions in this user guide: Add or manage Policy.
How do I allow a User access to work with Log Views?
Read and follow the instructions in this user guide: Log View permission set.
How do I allow a User access to work with Monitor Views?
Read and follow the instructions in this user guide: Monitor View permission set.
How do I allow a User access to work with the Repository Model?
Read and follow the instructions in this user guide: Repository Model permission set.
Next Step
Windows Authentication Mode:
Add or manage Role
Add or manage User
Add or manage Windows AD Group
OIDC/OAuth 2.0 Mode:
Add or manage Role
Add or manage Claim
Add or manage Policy
Related Topics
Access Management Components:
Roles – Define permission sets
Roles Overview – Manage all roles
Users – Manage user accounts (Windows mode)
Users Overview – User administration
Windows AD Groups – Active Directory integration (Windows mode)
Windows AD Groups - Overview – AD group management
Claims – Key/value authorization attributes (OIDC/OAuth 2.0 mode)
Claims Overview – Manage all claims
Policies – Groups of Claims (OIDC/OAuth 2.0 mode)
Policies Overview – Manage all policies
Permission Sets:
Permission Set for Log Views – Grant Log View access
Permission Set for Monitor Views – Grant Monitor View access
Permission Set for the Repository Model – Grant Repository access
Related Features:
Log Audits – Track user activity and changes
Log Views – What Roles can grant access to
Monitor Views – Monitoring with role-based access
Remote Actions – Permissions for self-service operations
Repository Model – Integration documentation access
Administration:
Administration – Main administration overview
Web Client – User interface
Install Nodinite v7 - OpenID – Configure OIDC/OAuth 2.0 authentication
Install Nodinite v7 - OpenID - EntraID – Azure AD (Entra ID) setup guide