Skip to main content

Role-Based Access Control (RBAC)

Reclamia enforces access control based on user roles defined in Keycloak.

Permission Matrix

ActionAdminManagerEmployee
Create Claim
View All ClaimsDept onlyOwn only
Assign ClaimDept onlyNo
Change PriorityDept onlyNo
Create Business RuleDept onlyNo
Access Admin ConsoleNoNo
Manage UsersNoNo
View AnalyticsDept onlyNo
Create AI AgentNoNo

Organization Isolation

  • Users only see claims from their organization
  • Cannot access other organizations’ data
  • Department filtering applies within organization
  • Admin can see entire organization

Department-Level Access

  • Managers see only their department’s claims
  • Employees see only assigned claims
  • Cannot view other departments’ claims
  • Unless specifically collaborated on

Data Security

Authentication

  • Keycloak SSO for centralized authentication
  • No passwords stored in Reclamia
  • JWT tokens validated by Kong Gateway

Authorization

  • Kong injects user headers
  • Backend verifies permissions
  • Role-based filtering on queries

Audit Logging

  • All user actions logged
  • Timestamps recorded
  • Cannot delete history
  • Available for compliance review

Next Steps