Boundary control

Any community, group or consortium is defined by its boundary that controls who’s a member and who’s not. Maintaining a high-quality life cycle management as well as proper use of user identities and roles are paramount for the security and overall trust of the consortium.

Effective on- and offboarding

Maintaining strategies that translates into process and automation for quick on- and off boarding to and from the consortium lowers the threshold to add new members that can contribute to the overall workflow quality. This may obviously include additional primary members but just as importantly it could include utility or third-party members acting as meta data providers or validators of data. Just as important is the need for controlled and effective consortium member off-boarding as this can be prompted with short notice and high priority.

Identity, role and control

At the heart of any access control lies two major components that thus play equally important roles in a cross-domain communication consortium. The identity of the member needs to be verified and periodic re-verified to ensure that data is indeed shared with the right party but just as important is the current roles of that identity as this can in turn filter said user has privileges to do with the data. Know Your Client (KYC) is a set of tasks and processes that should be implemented in consortiums to ensure that identities can be trusted so that these can be paired with well-maintained repositories of current consortium roles and to whom these apply. With this data any consortium member organization can then create their own approval and access policies that gives them just the amount of control that they need.

It is a well-known fact in identity management however that effective access control is given to role-based groups rather than to individual users. For this to be effective, logical role structures with the right level of granularity must be established and maintained. This domain of work and associated support systems is known as “Role Based Access Control” (RBAC) and is as relevant in cross-domain workflows as any internal environments. To provide a fit-for-purpose RBAC service a complete accountability stack needs to be manned and managed.

Boundary member life cycle management

Onboarding new boundary members as well as updating their creational status and terminating the from the network in a timely and secure manor is a process intensive and service centric task that we love to conduct and assist in!

Contact us

Know your boundary members

Let us do the boundary member due diligence to ensure that each new member entering is the entity they claim to be ensuring that you know with certainty with whom you are communicating!

Contact us

Role based access control

Creating and maintaining a centralized repository of logical consortium roles and their current users is essential for proper access management.We can help you and your consortium to establish and maintain this as well sorting structures and reasonable access granularities.

Contact us

Get In Touch

We love to help out and are fiercely convinced that we have what it takes to solve almost any cross-domain interoperability issues! We love to hear from you regardless of if you just want to take a coffee and chitchat or make the next big thing!