In our last article, we laid the groundwork for a best-practice methodology in IFS permissions management. The key message was simple: flexibility without structure leads to chaos. The two-layer model, functional roles holding permissions, end user roles bundling them, offers clarity, scalability, and maintainability.
But theory only gets you so far. This time, we move from concept to practice. Using a sales example, we’ll show how the two-layer approach translates into concrete structures: which roles to define, how to reuse them, and how to keep the whole setup transparent and auditable.
Most IFS customers start without a methodology. Some rely on single-layer roles, embedding all permissions directly into end user roles. Others attempt nested structures, stacking roles within roles. Both approaches can work short-term, but both lead to complexity: duplicated permissions, unclear responsibilities, and messy audits.
The two-layer model avoids these pitfalls by separating responsibilities:
This separation keeps the system flat, reusable, and easy to maintain.
To see how this works, let’s consider an example from the sales area. Four principles guide the design:
In our sales example, four end user roles cover both business and data responsibilities:
A key point: all four roles include a basic IFS permission set. This ensures they are standalone, any one of them can be assigned to a user without requiring additional supporting roles.
The next step is to define the functional roles that will be combined into these end user roles. This translation process starts from the requirements identified during role design workshops.
For example:
Notice the read-only vs. read/write variants. This is a practical way to provide differentiated access within the same domain without multiplying role definitions unnecessarily.
Consistency comes from naming conventions. In the example shown during the webinar, functional roles are prefixed with FR_, followed by a domain abbreviation (e.g., FIN for Finance, SLS for Sales), a description, and a suffix for access type (RO for read-only, RW for read/write).
The final step is bringing everything together in a matrix view: functional roles on one axis, end user roles on the other. Each end user role is simply a combination of functional roles.
This makes the structure transparent at a glance. It’s immediately clear which functional roles are reused, where overlaps exist, and how access is consistently assigned. It also supports audits, since the mapping between permissions and responsibilities is explicit.
The example demonstrates that the two-layer model is more than a best-practice guideline, it’s a workable design pattern that organizations can adopt immediately.
This article builds on our previous post, “Getting IFS Permissions Right: A Best-Practice Methodology,” where we introduced the two-layer model. Here we’ve shown what that model looks like in practice.
The next article in the series will explore permissions testing best practice and environment management, helping organizations validate and safeguard their role structures in real-world use.
In our next webinar we went deeper into testing and environment management for IFS permissions. If your team is moving to IFS Cloud or struggling with role audits, this session is especially relevant.
And as always, if you want to discuss your own role setup in more detail, get in touch. We’re happy to compare approaches and share our experience.