Ensure controlled, role-based access across desktop and mobile experiences.

Access control ensures that users only see and act on what they are authorized to — whether working in the office or approving and reviewing work via F2 Manager and F2 Touch.

Secure everywhere. Enforce access across desktop and mobile.

Role-based rules. Apply the same permissions consistently.

Reduced risk. Prevent unauthorized access and actions.

Product overview

Role-based access management

  • Role-based permissions and rights
  • Controlled access to data and actions
  • Secure access via F2 Manager
  • Mobile access through F2 Touch
  • Consistent enforcement across devices
Book a demo

Key benefits

Strong governance
Access follows defined roles and organizational rules.
Mobile security
Secure access is maintained when working outside the office.
Reduced risk
Unauthorized access and actions are prevented consistently.

Core capabilities

Role management
  • Define roles and permissions
  • Assign access based on responsibility
  • Enforce separation of duties
Device-aware access
  • Secure login via F2 Manager
  • Mobile access through F2 Touch
  • Same permissions across all interfaces
Continuous enforcement
  • Access checked for every action
  • Immediate effect of role changes
  • Central control of permissions

How it works

Approvals are surfaced to decision-makers through F2 Manager and F2 Touch, allowing secure review and action while maintaining full auditability.

Book a demo

How it works

A few simple steps are all that are needed to ensure a consistent and compliant process:

  1. Administrators define request types with workflows and rules
  2. Users submit requests using structured forms
  3. Requests are routed automatically to the right roles — also externally
  4. Decisions and approvals are documented
  5. Requests are completed with full audit trail

All steps are managed within the shared data model of cBrain F2, ensuring consistency across processes and products.

Book a demo

How it works

A few simple steps are all that are needed to ensure a consistent and compliant process:

  1. FOI requests are received via email, portals, or internal registration
  2. Requests are automatically structured as FOI cases
  3. Documents are collected, reviewed, and approved within the workflow
  4. Decisions and disclosures are formally documented
  5. Responses are sent with full traceability and audit logging

All steps are handled within the shared data model of cBrain F2, ensuring consistency and reuse across the organization.

Book a demo

Use cases

Mobile approvals

Support secure decision-making on the go.

Distributed work

Enable safe access across locations and devices.

Sensitive data

Protect confidential information consistently.

Trusted by government leaders

“I can review and approve work securely even when I’m not at my desk.”
Permanent Secretary
“Mobile access follows the same rules as office access, which is critical.”
IT Security Manager
“Access control gives us confidence that data is protected everywhere.”
Head of Information Security

Security & compliance

Role enforcement

Only authorized users can view or act on data.

Secure authentication

Access requires authenticated and approved identities.

Audit support

Access-related actions are logged and traceable.

Frequently asked questions

Does mobile access follow the same rules?
Arrow Down Icon
Can access be revoked instantly?
Arrow Down Icon
Is access auditable?
Arrow Down Icon

Ready to see how we can help you?

Please provide us with some information about yourself, and we will connect you with the most suitable expert. We offer a range of options, from a discussion on your digitalization challenges to a complimentary consultation reviewing your current processes.
Thank you, we have received your request and will be in touch shortly.
Oh no! Something went wrong while submitting the form. Please try again.

How it works

Access rights are defined centrally and enforced consistently, whether users work in the browser, F2 Manager, or F2 Touch.

Book a demo