Role-Based Security

With role-based security, you can limit a user's access to certain files, business processes, browser-based interfaces, services, and other product features and components according to the permissions you associate with that user's account.

Sterling B2B Integrator uses role-based security so that you can configure different levels of access permissions for different users within your organization.

You can define groups associated with a set of permissions, based on user activities or roles. A user account specifies the groups the user belongs to, along with the associated permissions. Permissions allow access to the different modules within Sterling B2B Integrator, and are the foundation of role-based security.

Your user account is linked to an associated Sterling B2B Integrator user name and password. Each time you log in, Sterling B2B Integrator verifies if you are a valid user and grants access only to the appropriate areas, based on the permissions assigned to you in the user account.

Role-Based Security and Message Management

Role-based security helps you manage message queues related to Web Extensions applications. Sterling B2B Integrator uses a user's security parameters when directing messages and documents to the appropriate user. For example, when a business process requires the approval of a user having specific permissions as a step in a business process, a human interaction service obtains the appropriate approving authority's identification from the Sterling B2B Integrator database, where it is stored as the user account data, and routes the document to that person.