Organisations can use relationships as the mechanism to delegate activities and responsibilities. Delegate role management to external customers, businesses or organisations to enable users to act on behalf of other persons in digital services, and authorise others to act on their behalf.
Delegated Authority is built on the Ubisecure B2B IAM platform that supports even the most complex combinations of relationship assignment with delegation of rights, roles and representation from individuals to individuals, individuals to organisations, organisations to individuals, and organisations to organisations.
Control fine-grained Relationship-Based Access Control
Electronic Power of Attorney
Partners, Subcontractors & Managed Service Providers
The most flexible, agile and proven delegation solution available today
Support individual or organisation identities as either the source or the target for the delegation. Mandates enable the delegation of authorisation, access control, roles and representation between parties in B2B, B2C, and B2B2C use cases and include associations to one or many application roles.
Triggers such as email invites are fully branded to reference your organisation’s brand for a low friction customer experience.
Delegated Authority & Identity Relationship Management
Allows the organisation to push the workload out of the service provider or helpdesk, to the administrator within the customer organisation, to have the administrator create and manage (sub)accounts on the service. The usual resource-intensive administration of multi-level authorisations is not required.
Access rights can be granular to vary depending on the specifics of the business relationship, project or contract.
Electronic Power of Attorney
Delegated Authority operates as a centralised authorisation server, where mandates act like power of attorneys. Delegating users can manage authorisation for delegates (both organisation or individuals) to have authority to represent them on digital services and applications. Depending on the use case, delegates can further delegate to multi-tiers of external users.
Partners, Subcontractors, & Managed Service Providers
Extend granular control of access to systems to business partners, subcontractors, consultants and managed service providers. Delegated Authority supports the right of a delegate to act on behalf of the delegator for mandated use cases, and under mandated conditions such as contract period, authentication method and workflow, and more. Automatically trigger account creation and close access privileges and deprovision at the end of contract periods.
Delegated Authority extends effectively to family access to digital services, supporting use cases like parental controls, management of family members subscriptions, and legacy planning.
What industry experts say about Ubisecure
“Ubisecure has demonstrated its value specifically in scenarios with complex B2B2C relationships, where its strength in delegating access is a differentiator to other providers in the market.”
Introducing Right to Represent
Reduce fraudulent organisational representation during provision of new services, high risk transactions and onboarding of new customers.
Delegated Authority uses Legal Entity Identifiers (LEI) as verified organisation attributes to digitally tie an individual identity to an organisation identity and provides a registry-based ability to check rights/authorisations to said organisation. Right to Represent reduces costs by automating manual verification workflows and KYC type business processes.
>> Learn More
VERO SKATT – Finnish Tax Authority Case Study
Significant savings for Finnish Tax Authority from using Delegated Authority & Relationship-based Access Control to bridge Individual and organisation identity:
- €8 saving per transaction
- 1m transactions per month
What is Delegated Authority?
What is Tiered Delegated User Management?
Delegated Authority use cases
Deploying a nationwide delegation platform for 400k+ organisations, citizens and 100+ Government services.
>> Read More
B2B & Supply Chain Identity Management
Considerations to better secure B2B and B2B2C users at scale with modern IAM functionality.
What is Relationship Based Access Control (ReBAC)?
How does Relationship Based Access Control work? Role Based Access Control vs Relationship Based Access Control.
>> Read More