Cloud roles typically reflect user segmentation from the cloud application perspective and control user access (RBAC). Cloud roles are defined by cloud application developers and/or operations.
Station roles reflect segmentation from the particular station (building) perspective. The station security system uses a role-based access control approach to control user permissions. The station owner and/or integrator who installs and configures the station defines station roles.
To have the ability to control the execution of cloud commands, the station should know at least the user role and the mapping between user cloud role (provided as one of JWT claim) and some predefined station role (used to control permission on the station level).
For example, from the cloud application side, standard and VIP hotel guests could have different roles but, to the station they have the same role: extremely restricted user.

| ACTION: Configure role mapping |
|---|
|
Create reasonable station roles to provide the required level of security and access control. Configure the mapping of cloud roles to station roles. |