Skip to main content
Skip table of contents

User identification and access management

The main objective of User identification and access management in NDD Orbix is to ensure security, compliance, and centralized control in corporate environments. This feature allows you to define who can access, view, or operate each area of the platform, protecting sensitive information and ensuring the integrity of the operation, especially in environments with multiple customers, units, and devices.

With granular permission control, NDD Orbix allows the creation of customized user profiles, adapting the level of access to the responsibilities of each employee. The system can be integrated with Single Sign-On (SSO) solutions and other security tools, making access faster without compromising data protection.

The platform also offers a unit structure, allowing you to organize operations by region, customer type, or device group. This segmentation ensures that each user has access only to the context relevant to their role.

In summary: the unit controls what you see; the permission controls what you can do with what you see.

This combination of segmented visibility and action control makes operations more efficient, secure, and customized, reducing risks and facilitating the administration of complex environments.


Explore more about this feature

Access the detailed documentation to explore the User identification and access management feature in more detail:

image-20250618-141651.png
Configure users

Create and manage users,
assigning permissions and controlling views.

Access โ†’

image-20250618-141638.png
Configure customers

Organize your customers and their devices, linking them to sites and departments.

Access โ†’


Key pain points we help solve

image-20250618-124855.png
Manual, slow,
and error-prone access management process
image-20250425-173604.png
Lack of control
over who
accesses
sensitive data
image-20250618-140424.png
Risk of unauthorized access due to misconfigured permissions

Key benefits for your operation

image-20250618-140650.png
Granular control of permissions by profile
image-20250618-140746.png
Integration with Single Sign-On (SSO)
image-20250618-140819.png
Segregation
of data by
device
image-20250425-174223.png
Centralized configuration of permissions
image-20250623-162436.png
Data
security
image-20250618-140923.png
Reduced time to configure new users

What makes our solution different from others

image-20250618-140819.png
Hierarchical structure of units
image-20250425-174223.png
Intuitive interface for access control
image-20250618-141154.png
Restricted viewing by context

User identification and access management goes beyond technical security: it represents a strategy for access governance, regulatory compliance, and operational agility, strengthening control over your operations.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.