Define and enforce who may view, edit, and decide across the platform.

Access rights ensure that responsibilities and permissions are clearly defined, enforced consistently, and aligned with organizational roles and policies.

Clear permissions. Define who can view, edit, and approve.

Immediate effect. Apply changes instantly.

Audit support. Log access changes and usage.

Product overview

Granular permission management

  • Fine-grained access to data and actions
  • Role-based permission assignment
  • Separation of duties enforcement
  • Immediate effect of permission changes
  • Consistent rights across processes
Book a demo

Key benefits

Clear responsibility
Permissions reflect formal roles and responsibilities.
Reduced risk
Users cannot access or change what they are not authorized to.
Consistent enforcement
Access rights apply uniformly across the organization.

Core capabilities

Permission design
  • Define read, write, and approve rights
  • Control access to specific objects
  • Support complex role structures
Role assignment
  • Assign rights through roles
  • Manage users and groups
  • Support organizational changes
Separation of duties
  • Prevent conflicting permissions
  • Enforce governance rules
  • Reduce compliance risk

How it works

Approvals are surfaced to decision-makers through F2 Manager and F2 Touch, allowing secure review and action while maintaining full auditability.

Book a demo

How it works

A few simple steps are all that are needed to ensure a consistent and compliant process:

  1. Administrators define request types with workflows and rules
  2. Users submit requests using structured forms
  3. Requests are routed automatically to the right roles — also externally
  4. Decisions and approvals are documented
  5. Requests are completed with full audit trail

All steps are managed within the shared data model of cBrain F2, ensuring consistency across processes and products.

Book a demo

How it works

A few simple steps are all that are needed to ensure a consistent and compliant process:

  1. FOI requests are received via email, portals, or internal registration
  2. Requests are automatically structured as FOI cases
  3. Documents are collected, reviewed, and approved within the workflow
  4. Decisions and disclosures are formally documented
  5. Responses are sent with full traceability and audit logging

All steps are handled within the shared data model of cBrain F2, ensuring consistency and reuse across the organization.

Book a demo

Use cases

Sensitive cases

Restrict access to confidential work.

Decision authority

Ensure only authorized roles can approve actions.

Organizational change

Adapt permissions as roles and structures evolve.

Trusted by government leaders

“Clear access rights make responsibilities explicit across the organization.”
Head of Administration
“We reduced risk by removing ad-hoc access decisions.”
IT Security Manager
“Permission changes take effect immediately, which is critical.”
Identity and Access Manager

Security & compliance

Role-based control

Permissions are granted through approved roles only.

Immediate enforcement

Changes apply instantly across the platform.

Audit support

Access changes and usage are logged and traceable.

Frequently asked questions

Are access rights role-based?
Arrow Down Icon
Do changes apply immediately?
Arrow Down Icon
Are access changes logged?
Arrow Down Icon

Ready to see how we can help you?

Please provide us with some information about yourself, and we will connect you with the most suitable expert. We offer a range of options, from a discussion on your digitalization challenges to a complimentary consultation reviewing your current processes.
Thank you, we have received your request and will be in touch shortly.
Oh no! Something went wrong while submitting the form. Please try again.

How it works

Access rights are defined centrally and enforced automatically whenever users view data or perform actions.

Book a demo