Access control bootstrapping

After Edge Flow Manager (EFM) is secured, you have to set up and configure the access control policies and permissions in a system.

Access control bootstrapping involves two key aspects: authentication and authorization.

  • Authentication ensures that EFM can verify the identity of the client or the user usingconfigured credentials, as detailed in the User authentication documentation.

  • Authorization determines whether the authenticated user is allowed to perform specific actions on the requested data. Authorization in EFM is driven by local access control policies. To grant these policies to users, you need to establish an initial admin account with the authority to set up user access. This section provides an overview of that process.