Adaptive Access Control

Table of Contents

1. Introduction

The Federated Adaptive Access Control system allows organizations to implement a multi-node security framework where access decisions are made dynamically based on risk assessments, policies, and configurations. This guide outlines how to set up and manage this system using the provided Authoring Tool.

2. Overview of the Authoring Tool

The Authoring Tool is a graphical interface that allows administrators to define, manage, and deploy adaptive access control configurations. It includes the following key components:

  • AccessFlow Authoring: Used to create and manage the flow of access control across multiple assets and nodes.
  • AdaptiveAccessControl Policy: A policy management module where rules and rulesets are defined.
  • AdaptiveAccessNode Authoring: A tool to create and configure nodes involved in the access control process.
  • AdaptiveAccessNode Configuration: Allows for configuring and linking nodes into specific access flows.

3. Step-by-Step Configuration

Creating Adaptive Access Control Policies

  • Login

Ztaas Landing Screen

  • Select the Adaptive Access Control Product and Click on Open

Adaptive access control product screen

  • Navigate to the Adaptive Access Control Product

    • Select Authoring Tool from the main menu.

Ztaas Landing Screen

  • Access the Policy Section

    • Click on AdaptiveAccessControl Policy within the Authoring Tool.

Setting Up Rules and Rulesets

  • Select Ruleset from Dropdown

Adaptive access policy screen

  • Click on Add Ruleset:

Ruleset Landing screen

  • Create Ruleset:

Ruleset create screen

  • Threshold Type: Defines acceptable limits for various attributes.
  • RiskScore Type: Defines rules based on calculated risk scores.
  • Determination Type: Defines rules based on the access determination logic (e.g., SAFE, NOTSAFE).
  • Create rules under each ruleset.

Configuring Access Flows

  • Navigate to AccessFlow Authoring and define access flows for assets.
  • Associate access flows with rulesets defined earlier.

Authoring Adaptive Access Nodes

  • Create and configure AdaptiveAccessNodes for different entry and federated points in the system.

Configuring Adaptive Access Node Connections

  • Select AccessFlow and connect nodes to establish control flow across nodes.

4. Use Case Scenarios

  • Scenario 1: Single Node Access Control
  • Scenario 2: Multi-Node Federation with Three Nodes
  • Scenario 3: Complex Federation with N Nodes

5. Best Practices

  • Regularly update policies.
  • Monitor and adjust access flows.
  • Use descriptive names for nodes and rulesets.

6. Troubleshooting

  • Verify node configuration.
  • Check policy enforcement issues.

7. Conclusion

By following this guide, administrators can effectively set up and manage a federated adaptive access control system across multiple nodes and assets.