Role Based Access Control
Roles in CertiNext define what actions a user is allowed to perform across the platform. They are the primary mechanism for enforcing least-privilege access, separation of duties, and operational governance in certificate and key lifecycle management.
CertiNext provides both predefined system roles and the ability to create custom roles with fine-grained permissions, allowing organizations to align access controls precisely with real-world responsibilities.

Role-Based Access Control (RBAC)
CertiNext uses a role-based access control (RBAC) model where permissions are grouped into logical functional areas such as:
Certificate lifecycle operations
Certificate Authorities and CA connectors
Discovery and inventory
Keys and key stores
Automation, bots, and provisioning
Orders, renewals, and revocations
Financial and billing operations
User, group, and policy administration
Reporting, audit logs, and compliance views
Each role represents a curated set of permissions across these areas, ensuring users only see and act on what is relevant to their job function.
Predefined Roles
CertiNext includes predefined roles to support common enterprise use cases, such as:
Administrator – Full platform access, including configuration, CA management, policies, users, and billing
Manager – Oversight of certificate operations, approvals, and reporting without full administrative control
Standard / Basic Users – Limited certificate request and operational capabilities
Discovery Users – Restricted access focused on certificate discovery and inventory management
These roles accelerate onboarding while enforcing strong governance by default.
Custom Roles
For more advanced or regulated environments, CertiNext supports custom role creation, allowing administrators to define roles tailored to specific operational needs.
When creating a custom role, administrators can:
Enable or disable permissions at a granular level
Control access to individual modules and actions (e.g., renew certificates, revoke certificates, manage discovery bots)
Combine read-only and action-based permissions
Activate or deactivate roles as needed
This allows organizations to model roles such as PKI Operator, Security Reviewer, DevOps Automation User, or Compliance Auditor with precision. Create Custom Role _ CERTInext
Scope of Permissions
Role permissions in CertiNext can span across:
APIs and automation (API credentials, bots, provisioning)
Public and private CAs (creation, management, suspension, revocation)
Certificate lifecycle actions (issue, renew, reissue, revoke, suspend)
Discovery and CT log monitoring
Keys and key profiles
Orders and approvals
Users, groups, and access controls
Reports and audit logs
This ensures that even highly sensitive operations can be delegated safely without granting unnecessary access elsewhere.
Roles, Groups, and Tags Together
Roles define what a user can do, while groups and tags define where they can do it. CertiNext evaluates access using all three dimensions:
Role – permitted actions
Group access – permitted organizational scope
Tag restrictions – permitted environments or assets
This layered model enables strong isolation between teams, applications, and environments while maintaining centralized governance.
Auditability and Governance
All role assignments, modifications, and permission changes are:
Logged in audit logs
Traceable to the administrator who made the change
Available for compliance and security reviews
This ensures accountability and supports internal and external audits.
Why Roles Matter
In certificate and trust operations, overly broad access is a major source of risk. Well-designed roles help organizations:
Prevent unauthorized certificate issuance or revocation
Enforce separation of duties
Reduce human error
Meet compliance and audit expectations
Scale operations safely across teams
Roles as a Governance Control
In CertiNext, roles are not just a convenience feature—they are a core governance control. By combining fine-grained permissions with auditability and scoped access, CertiNext enables organizations to operate complex public and private trust environments securely, responsibly, and at enterprise scale.
Session Enforcement on Role Changes
Important: When a user’s role is modified in CertiNext, the user is automatically logged out of the application. This enforced logout ensures that updated permissions take effect immediately and prevents users from continuing an active session with outdated or elevated access rights. The user must sign in again to resume access under the newly assigned role, supporting strong security, least-privilege enforcement, and audit integrity.
Last updated
