Control access efficiently by grouping users with shared permissions.

Security groups simplify access management by allowing permissions to be assigned and maintained for groups of users rather than individuals.

Simplified management. Assign access through groups, not individuals.

Consistent rights. Ensure equal access for equal roles.

Scalable control. Manage access efficiently at scale.

Product overview

Group-based access management

  • Group users by role or function
  • Assign permissions to groups
  • Reuse groups across processes
  • Simplify onboarding and changes
  • Centralized group governance
Book a demo

Key benefits

Simplified administration
Access is managed once per group instead of per user.
Consistent access
Users in the same role receive the same permissions.
Reduced errors
Group-based control lowers the risk of misconfigured access.

Core capabilities

Group definition
  • Create groups by role or unit
  • Add and remove users easily
  • Support organizational structures
Permission assignment
  • Assign access rights to groups
  • Apply permissions consistently
  • Update access centrally
Lifecycle management
  • Manage group changes over time
  • Support role changes and exits
  • Maintain clean access structures

How it works

Approvals are surfaced to decision-makers through F2 Manager and F2 Touch, allowing secure review and action while maintaining full auditability.

Book a demo

How it works

A few simple steps are all that are needed to ensure a consistent and compliant process:

  1. Administrators define request types with workflows and rules
  2. Users submit requests using structured forms
  3. Requests are routed automatically to the right roles — also externally
  4. Decisions and approvals are documented
  5. Requests are completed with full audit trail

All steps are managed within the shared data model of cBrain F2, ensuring consistency across processes and products.

Book a demo

How it works

A few simple steps are all that are needed to ensure a consistent and compliant process:

  1. FOI requests are received via email, portals, or internal registration
  2. Requests are automatically structured as FOI cases
  3. Documents are collected, reviewed, and approved within the workflow
  4. Decisions and disclosures are formally documented
  5. Responses are sent with full traceability and audit logging

All steps are handled within the shared data model of cBrain F2, ensuring consistency and reuse across the organization.

Book a demo

Use cases

User onboarding

Grant correct access quickly to new staff.

Organizational change

Adapt access as teams and roles change.

Large organizations

Manage access efficiently at scale.

Trusted by government leaders

“Security groups made access management far more manageable.”
IT Security Manager
“We can onboard new staff quickly by assigning them to the right groups.”
System Administrator
“Group-based access reduced configuration errors significantly.”
Head of IT Operations

Security & compliance

Central control

Groups and permissions are managed centrally.

Role alignment

Groups reflect formal organizational roles.

Audit support

Group changes and assignments are logged.

Frequently asked questions

Can users belong to multiple groups?
Arrow Down Icon
Are group changes immediate?
Arrow Down Icon
Are group changes auditable?
Arrow Down Icon

Ready to see how we can help you?

Please provide us with some information about yourself, and we will connect you with the most suitable expert. We offer a range of options, from a discussion on your digitalization challenges to a complimentary consultation reviewing your current processes.
Thank you, we have received your request and will be in touch shortly.
Oh no! Something went wrong while submitting the form. Please try again.

How it works

Administrators define security groups and assign permissions once, with all group members automatically inheriting the correct access rights.

Book a demo