Ensure controlled, role-based access across desktop and mobile experiences.

Access control ensures that users only see and act on what they are authorized to — whether working in the office or approving and reviewing work via F2 Manager and F2 Touch.

Secure everywhere. Enforce access across desktop and mobile.

Role-based rules. Apply the same permissions consistently.

Reduced risk. Prevent unauthorized access and actions.

Product overview

Role-based access management

  • Role-based permissions and rights
  • Controlled access to data and actions
  • Secure access via F2 Manager
  • Mobile access through F2 Touch
  • Consistent enforcement across devices
Book a demo

Key benefits

Strong governance
Access follows defined roles and organizational rules.
Mobile security
Secure access is maintained when working outside the office.
Reduced risk
Unauthorized access and actions are prevented consistently.

Core capabilities

Role management
  • Define roles and permissions
  • Assign access based on responsibility
  • Enforce separation of duties
Device-aware access
  • Secure login via F2 Manager
  • Mobile access through F2 Touch
  • Same permissions across all interfaces
Continuous enforcement
  • Access checked for every action
  • Immediate effect of role changes
  • Central control of permissions

Use cases

Mobile approvals

Support secure decision-making on the go.

Distributed work

Enable safe access across locations and devices.

Sensitive data

Protect confidential information consistently.

Trusted by government leaders

“I can review and approve work securely even when I’m not at my desk.”
Permanent Secretary
“Mobile access follows the same rules as office access, which is critical.”
IT Security Manager
“Access control gives us confidence that data is protected everywhere.”
Head of Information Security

Security & compliance

Role enforcement

Only authorized users can view or act on data.

Secure authentication

Access requires authenticated and approved identities.

Audit support

Access-related actions are logged and traceable.

Frequently asked questions

Does mobile access follow the same rules?
Arrow Down Icon
Can access be revoked instantly?
Arrow Down Icon
Is access auditable?
Arrow Down Icon

Ready to see how we can help you?

Please provide us with some information about yourself, and we will connect you with the most suitable expert. We offer a range of options, from a discussion on your digitalization challenges to a complimentary consultation reviewing your current processes.
Thank you, we have received your request and will be in touch shortly.
Oh no! Something went wrong while submitting the form. Please try again.