Skip to content

Managing Real-Time Zero-Trust Admin Access to an Inheritance Tree

At White Cloud Security, we’ve built our Zero-Trust App and Data Security Model to extend not just to applications, but also to admin access and system management. Using our Security Groups Inheritance Tree and real-time Admin Groups, you can enforce strict, auditable, and granular control over who can manage which parts of your infrastructure.

In this post, we walk through how to delegate and manage real-time Zero-Trust Admin access within an Inheritance Tree of Security Groups, using Subgroup Organizations, Admin Groups, and Policy Profiles.


🔐 Core Components

To understand how access is managed, start with these foundational system elements:

  • Organizations (Orgs): Logical containers for grouping users, endpoints, and policies.
  • Inheritance Trees of Subgroups: Security Groups arranged in parent-child hierarchies, where access and policies cascade.
  • Security Groups: Groups that manage endpoints, policies, and inheritance logic.
  • Policy Profiles: Reusable policy sets shared in real time across multiple Security Groups.
  • Admin Groups: Control who has admin rights within specific Security Groups — in real time.
  • Users: Assigned roles like Org Viewer, Org Admin, System Agent, Account Agent, etc., which determine their visibility and control.

See the Zero-Trust App Security Model and Security Groups Inheritance Tree for background.


🧭 Real-Time Admin Access Flow

✅ Step-by-Step: Delegate Zero-Trust Admin Access


1. Create a Subgroup Organization

A Subgroup Org helps scope admin access to a specific branch of the Inheritance Tree:

  • Navigate to the Graph View for your Security Group
  • Choose “Assign this Subgroup to an Org”

Assign to Subgroup Org

  • Select "Create Subgroup Org"

Create Subgroup Org

  • The Subgroup Org now appears in the Graph View

Assign to Subgroup Org

See How to Use Subgroup Orgs.


2. Create an Admin Group within That Subgroup Tree

  • Right-click the new Subgroup Org
  • Choose “Add Subgroup”

Add Subgroup

  • Enter a name for the Admin Group (e.g., Austin IT Admins)

Enter a name

  • This creates an Admin Group for that Inheritance Tree

Creates Admin Group

Admin Groups grant control only over Security Groups that permit them. Learn more on the Admin Access Control page.

3. Permit the Admin Group in Your Security Group

  • Select the Security Group you want the Admin Group to manage

Select the Security Group

  • Open “Admins I Can Trust”

Open “Admins I Can Trust

  • Use the “Search for Admin Name” filter
  • Permit the Admin Group

Trust the Admin Group

  • Click on the "Show Approved Profiles" icon

Show Approved Profiles

  • Verify that the Admin Group has access to the Security Group

Verify that the Admin Group

This allows the Admin Group members to edit the Security Group and its policies.


4. Add the User to the Subgroup Org

  • On the Graph View page
  • Browse to the User Account to add as an Admin

Click Add to Org

  • Click “Add to Org”
  • Filter by Org Name and confirm the user is now a member Choose the correct Org Role:
  • Org Admin to edit org details and manage members
  • Org Viewer for reporting and visibility only

Add as Member to Subgroup Org

  • Confirm Adding User as Member of Subgroup Org

Confirm Adding as Member to Subgroup Org

- Verify that the User is a Member of the Subgroup Org

Verify that the User is a Member of the Subgroup Org

Read more in Organization Roles and Delegation.


5. Add the User to the Admin Group starting with "I Know Them"

  • Select the Admin Group

Select the Admin Group

- Click “Manage Admin Access”

  • Manage Advisor Access

  • Use the “Search for Org Name” filter to find the User

  • Click on **"I Know Them" to enable their proile in "Profiles I Can Trust"

  • Click on I Know Them


6. Permit the User and "Profiles I Can Use"

  • Go to “Profiles I Can Use”

  • Open Profiles I Can Trust

  • Filter by Org Name and click “Permit” next to their name

  • This confirms they are a known and authorized Admin.

  • Trust the User in the Admin Group


7. Verify Admin Access

  • Click on "Show Approved Admins" in the Admin Group

Show Trusted Admins

  • Verify the User is an Admin

Verify User is an Admin

8. User can verify their Admin Access

  • The User clicks on “Groups I Manage” in the "Main Menu"

Verify User Admin Access in Groups I Manage

  • Click "Edit" to Confirm the user now has management rights for that Security Group

Verify User Admin Access in Groups I Manage

To audit Admin Access, see the Security Event Log Reference.


⚠️ Key Access Control Concepts

  • Security Group ownership or Admin Approval is required to manage a Security Group
  • Even System Admins must be added to an Admin Group to manage that Security Groups
  • System Agents have read-only browse access to all security groups
  • Customers should never be made System Agents
  • Account Agents can add users for their team only within their Org

See our RBAC and Access Control Model and more details on roles and access isolation.


✅ Summary: Role Checklist

Role Responsibilities
Org Admin Edit Org name, add/remove users
Org Viewer Read-only access and reporting
Admin Group Member Manage Security Groups that trust their Admin Group
System Agent Read-only access to all Security Groups
Account Agent Add users within their own Organization
Master Admin View-As privileges (audit logged)


🧠 Final Thoughts

Real-time Zero-Trust Admin delegation lets you control exactly who can manage what — and nothing else. By aligning your Security Groups and Subgroup Orgs with Admin Groups and trusted relationships, White Cloud Security provides unmatched granularity and clarity in administrative access control. No blind spots, no backdoors, no assumptions.

Only the trusted and verified have access — and only to what they’ve explicitly been granted.