Fluenta One access control: beyond roles and passwords

In a multinational company's procurement process, different actors work in the same system: the head of the finance department approves the tender documentation worth 500 thousand euros, later the warehouse worker confirms the arrival of goods. The finance manager doesn't need to see exactly how many pallets arrived, and the warehouse worker cannot see the transaction value. Both receive exactly the information they need for their work.

Access control is one of the most critical, yet least noticeable elements of enterprise workflow automation. While most decision-makers are aware that "there are roles and permissions," few understand how deeply different approaches affect daily operations, security, and regulatory compliance.

AI Accordion Section - Native Blog Style
AI

No time to read through? Get AI summary!

Original article reading time: 6 minutes
~40 second read

Fluenta One access control: Smart permissions for complex business

Traditional Role-Based Access Control (RBAC) systems assign fixed permissions to roles like "procurement manager" or "warehouse worker." While simple, RBAC struggles with real-world complexity—leading to an explosion of specialized roles that become impossible to manage.

The ABAC advantage

Fluenta One uses Attribute-Based Access Control (ABAC), which considers not just who you are, but what you're doing, with what data, and under what circumstances. Permissions are determined by dynamic rules evaluating user attributes, data attributes (value thresholds, confidentiality levels), environmental factors (time, location, process phase), and the specific operation being performed.

Field-level precision

ABAC enables field-level access control—different users see different fields in the same form. A technical approver sees specifications but not prices, while a budget manager sees costs but not technical details. This isn't just security; it's efficiency—everyone receives only relevant information.

Beyond company boundaries

Fluenta One extends access control to external partners with the same precision as internal users. When subsidiaries share data with parent companies or external consultants join projects, field-level rules precisely control what information crosses organizational boundaries—critical for regulated industries like finance, pharmaceuticals, and defense.

Real-time security and compliance

Following Zero Trust principles, Fluenta One continuously validates permissions with every operation. When someone changes departments or a project reaches new value thresholds, permissions update immediately. All access is automatically logged for audit compliance (DORA, GDPR, SOX), and the system integrates with existing SSO solutions like Microsoft Entra and Okta for seamless, centralized user management.

The limitations of simple roles

Traditional workflow systems typically use a Role-Based Access Control (RBAC) model. Its operation is simple: we define roles – procurement manager, finance manager, warehouse worker – and assign permissions to them.

This approach works for simple processes. What happens when reality is more nuanced?

A procurement manager can see contracts under 100 thousand euros, but has no access to those above. In the early stage of a project, the technical specification is visible to everyone, but when sensitive price calculations are added, access suddenly needs to be restricted. An external consultant may work on the project, but certain internal data remains closed to them.

In RBAC systems, these situations can only be handled by creating more and more roles: "procurement manager under 100k", "procurement manager between 100k-500k", "project manager early phase", "project manager sensitive phase". The number of roles grows exponentially, the system becomes incomprehensible, and maintenance becomes a nightmare.

When context matters: ABAC approach

Advanced workflow systems, including Fluenta One, apply an Attribute-Based Access Control (ABAC) approach. The fundamental difference is simple but has far-reaching consequences: it's not just about who you are, but what task you're performing, with what data, under what circumstances.

In ABAC systems, permissions are determined by rules that consider, among other things:

  • User attributes: role, organizational unit, approval competency 
  • Data attributes: value threshold, confidentiality level, project status 
  • Environmental factors: time, geographic location, current phase of the process 
  • The operation to be performed: read, modify, approve, forward

In practice, this means that a rule can look like this, for example: "The user can see the financial data if the project value is less than their approval competency, AND the project has not yet been closed, AND they are not an external consultant."

Field-level visibility: the importance of details

One of the most valuable ABAC capabilities is field-level access control. This means that different users see different fields in the same form.

Let's take the approval of a procurement order as an example:

  • The requestor fills out the complete form: what they want to procure, with what specification, for which project, with what justification, with a quote from the selected supplier 
  • The technical approver sees the specifications and whether the product meets the technical requirements, but doesn't see the price 
  • The budget manager sees the price and the project's remaining budget, but doesn't see the detailed technical specification 
  • The procurement manager sees all data because they give the final approval for the order

Each actor works with the same document, in the same process, but everyone only receives the information relevant to them. This is not just a security issue, it's also an efficiency issue. There's no need to browse through irrelevant data, no need to ask for explanations for information that doesn't concern us.

Cross-organizational data sharing: control beyond corporate boundaries

Modern business processes increasingly extend beyond corporate boundaries. Parent-subsidiary relationships, supplier collaborations, involvement of external consultants – in each case, the challenge is to precisely control who sees what.

In the case of Fluenta One, access control doesn't stop at the company gates. The same field-level rules can be applied to external partners as to internal employees.

When a subsidiary provides data to the parent company, it can be precisely determined which fields are transmitted and which data remains visible only to the subsidiary. When an external partner participates in the process, access can be controlled with the same level of detail as if they were an internal employee.

This is particularly important in sensitive industries – finance, pharmaceuticals, defense – where compliance is mandatory.

Continuous validation: security in real time

A critical, often overlooked aspect: it's not enough to check permissions once when someone enters the system. Fluenta One follows the Zero Trust principle and revalidates with every single operation whether the user is authorized for that particular activity.

This is important because permissions change: someone transfers to another department, a project reaches a value threshold where higher-level approval is needed, a contract's confidentiality level changes, or an employee leaves the company.

Continuous validation ensures that these changes take effect immediately, without having to manually intervene in every process.

Integrated authentication: one less system

Many companies already use a central single sign-on (SSO) solution – Microsoft Entra (formerly Azure AD), Okta, Ping Identity, or Google Cloud Identity. Fluenta One can integrate with these systems, so users access it with the same login as other corporate applications.

The advantage goes beyond convenience: when an employee leaves the company and IT deletes their access in the central SSO system, they automatically lose access to Fluenta One as well.

Moreover, information from the central system – organizational unit, position, supervisor – can automatically be built into permission rules, so Fluenta One always works with up-to-date data.

Permission areas: process initiation, completion, approval

One of the finer aspects of access control is that who can perform what operations can differ. For a process, these permissions can look like this:

  • Process initiation: Who can initiate the request? Can a junior employee start a budget overrun request? Can only certain positions initiate the supplier qualification process? 
  • Data completion: Who can modify certain parts of an already submitted request? Can only the technical team modify the technical specification, only controlling the financial data? 
  • Approval: Who can decide whether a request can proceed? Who can give final permission? At what value thresholds is higher management approval needed?

These can be controlled separately, so a user may see the process, see the data, but may not be able to modify or approve them.

Process visibility and data access: two separate dimensions

A deeper layer of access control is that process status visibility and access to the specific data within it can be controlled separately.

A manager can see that a tender is in progress, track its status, know who's working on it, where it stands – without seeing the sensitive price calculation or technical details. Controlling can see every process where a financial obligation arises, but the specific technical specifications are not relevant to them. The compliance team can track all processes for audit purposes without accessing business-sensitive information.

This separation enables transparency and control mechanisms while maintaining the protection of confidential information.

Audit and compliance: automatic documentation

In the era of DORA, GDPR, SOX and similar regulations, access control is not just an internal security issue. You must be able to prove who could see what, when and why.

Fluenta One's access control automatically generates this documentation. Every access is recorded, every rule is traceable, every change is logged. When an auditor asks who could see a particular document, the system shows exactly: these users, with these permissions, at this time.

Summary

Access control is an often forgotten topic when we talk about workflow automation. Yet it's one of the most determining factors in how capable a workflow system is of supporting real business complexity. The difference between RBAC and ABAC affects scalability, maintainability, security and regulatory compliance.

Fluenta One's approach reflects this complexity: with its sophisticated access control, it truly supports complex, dynamic business processes.

The sooner you start, the sooner you experience the benefits.