Permission & Access Models

Control what agents can access and do through structured permission systems

ABAC: Attribute-Based Access Control

ABAC makes access decisions based on attributes of the agent, resource, and environment. This enables fine-grained, context-aware policies.

👤 Agent Attributes

Properties of the agent: department, clearance level, location, certification

📦 Resource Attributes

Properties of the resource: type, classification, owner, department

🌍 Environment Attributes

Context of the request: time, location, network, threat level

Interactive: ABAC Policy Simulator

Adjust attributes and see how ABAC policies make access decisions:

Configure Attributes

Access Decision
Policy: Allow if agent.dept = resource.dept AND time = business_hours
Access Granted
Dept match: | Business hours:

Example Scenarios

✓ ABAC Strengths

  • • Fine-grained control
  • • Context-aware decisions
  • • Dynamic policies
  • • Scales to complexity

⚠ ABAC Limitations

  • • Complex to implement
  • • Harder to audit
  • • Performance overhead
  • • Requires attribute infrastructure
💡
When to Use ABAC

Choose ABAC when you need context-aware access control: time-based restrictions, location-based access, or complex business rules. Combine with RBAC: use roles for basic structure, ABAC for exceptions.

← Previous: RBAC Model