Access control bootstrapping

After Edge Flow Manager is secured, you have to set up and configure the access control policies and permissions in a system.

Access control bootstrapping involves two key aspects: authentication and authorization.

  • Authentication ensures that Edge Flow Manager can verify the identity of the client or the user usingconfigured credentials, as detailed in the User authentication documentation.

  • Authorization determines whether the authenticated user is allowed to perform specific actions on the requested data. Authorization in Edge Flow Manager is driven by local access control policies. To grant these policies to users, you need to establish an initial admin account with the authority to set up user access. This section provides an overview of that process.