Identity and authentication

All automation actions, for example, create, view, update, deploy, and delete, across Automation 360 are done only after Control Room authentication is successfully completed.

After authentication is successful, the platform applies a second mandatory level of access control enforcement in the form of fine-grained Role-Based Access Control (RBAC).

The Control Room has its own controls to prevent unauthorized access to any automation data.