Access Management Sidebar Menu Item
On this page, a Nodinite Administrator learns how to navigate and manage the Access Management sub-menu within the Administration sidebar, as seen in the Nodinite Web Client. The 'Access Management' sub-menu is a crucial tool for managing access rights for roles, users, and Windows AD Groups. This sub-menu includes entities such as Roles, Users and Windows AD Groups.
Take control of your integration environment with Nodinite's Access Management. This feature empowers you to:
✅ Enforce security policies and compliance
✅ Manage access for roles, users, and AD groups
✅ Streamline administration with a user-friendly interface
✅ Ensure only authorized users access sensitive data
Nodinite uses Role-based security, a powerful and flexible method for managing access rights. The Managing Nodinite user guide covers this topic in detail—be sure to review it before managing assigned access rights.

As a Nodinite Administrator, you have access to the 'Access Management' menu in the Nodinite Web Client. This menu is a powerful tool at your disposal.
Sub-menu Items
The following sub-menu items empower you to enforce security and streamline access:
Frequently Asked Questions
What's the difference between Users and Windows AD Groups?
Users are individually managed accounts within Nodinite. Use when:
- You have external users (partners, vendors) not in your AD
- You need fine-grained control over specific individuals
- You don't have Active Directory integration
Windows AD Groups leverage your existing AD infrastructure. Use when:
- You want automatic provisioning based on AD group membership
- You need to maintain access control in one place (AD)
- You have many users with similar permissions
Can one user have multiple roles?
Yes! Users can be assigned multiple Roles, and permissions are cumulative. For example:
- User assigned to "Business User" role gets read access
- Same user assigned to "Developer" role gets Repository Model access
- User has both sets of permissions
How do I revoke access quickly in an emergency?
Options:
- Disable the User - Immediate access revocation
- Remove Role assignment - Remove specific permissions
- Modify the Role - Change what all role members can access
What's the principle of least privilege?
Grant users only the minimum permissions needed for their job function. For example:
- Business users: Access to their Log Views only, not all integrations
- Developers: Test/Dev environment access, not Production
- Operations: Full monitoring access, but no configuration changes
How do I audit who has access to what?
Use Log Audits to track:
- Who accessed which Log Views
- Who performed configuration changes
- Who executed Remote Actions
- When permissions were modified
How do I add a Role?
Read and follow the instructions in this user guide: Add or manage Role.
How do I add a User?
Read and follow the instructions in this user guide: Add or manage User.
How do I add a Windows AD Group?
Read and follow the instructions in this user guide: Add or manage Windows AD Group.
How do I allow a User access to work with Log Views?
Read and follow the instructions in this user guide: Log View permission set.
How do I allow a User access to work with Monitor Views?
Read and follow the instructions in this user guide: Monitor View permission set.
How do I allow a User access to work with the Repository Model?
Read and follow the instructions in this user guide: Repository Model permission set.
Next Step
Add or manage Role
Add or manage User
Add or manage Windows AD Group
Related Topics
Access Management Components:
Roles – Define permission sets
Roles Overview – Manage all roles
Users – Manage user accounts
Users Overview – User administration
Windows AD Groups – Active Directory integration
Windows AD Groups - Overview – AD group management
Permission Sets:
Permission Set for Log Views – Grant Log View access
Permission Set for Monitor Views – Grant Monitor View access
Permission Set for the Repository Model – Grant Repository access
Related Features:
Log Audits – Track user activity and changes
Log Views – What Roles can grant access to
Monitor Views – Monitoring with role-based access
Remote Actions – Permissions for self-service operations
Repository Model – Integration documentation access
Administration:
Administration – Main administration overview
Web Client – User interface