Adaptive Access Control
Table of Contents
- Introduction
- Overview of the Authoring Tool
- Step-by-Step Configuration
- Use Case Scenarios
- Best Practices
- Troubleshooting
- Conclusion
1. Introduction
The Federated Adaptive Access Control system allows organizations to implement a multi-node security framework where access decisions are made dynamically based on risk assessments, policies, and configurations. This guide outlines how to set up and manage this system using the provided Authoring Tool.
2. Overview of the Authoring Tool
The Authoring Tool is a graphical interface that allows administrators to define, manage, and deploy adaptive access control configurations. It includes the following key components:
- AccessFlow Authoring: Used to create and manage the flow of access control across multiple assets and nodes.
- AdaptiveAccessControl Policy: A policy management module where rules and rulesets are defined.
- AdaptiveAccessNode Authoring: A tool to create and configure nodes involved in the access control process.
- AdaptiveAccessNode Configuration: Allows for configuring and linking nodes into specific access flows.
3. Step-by-Step Configuration
Creating Adaptive Access Control Policies
- Login
- Select the Adaptive Access Control Product and Click on Open
-
Navigate to the Adaptive Access Control Product
- Select Authoring Tool from the main menu.
-
Access the Policy Section
- Click on AdaptiveAccessControl Policy within the Authoring Tool.
Setting Up Rules and Rulesets
- Select Ruleset from Dropdown
- Click on Add Ruleset:
- Create Ruleset:
- Threshold Type: Defines acceptable limits for various attributes.
- RiskScore Type: Defines rules based on calculated risk scores.
- Determination Type: Defines rules based on the access determination logic (e.g., SAFE, NOTSAFE).
- Create rules under each ruleset.
Configuring Access Flows
- Navigate to AccessFlow Authoring and define access flows for assets.
- Associate access flows with rulesets defined earlier.
Authoring Adaptive Access Nodes
- Create and configure AdaptiveAccessNodes for different entry and federated points in the system.
Configuring Adaptive Access Node Connections
- Select AccessFlow and connect nodes to establish control flow across nodes.
4. Use Case Scenarios
- Scenario 1: Single Node Access Control
- Scenario 2: Multi-Node Federation with Three Nodes
- Scenario 3: Complex Federation with N Nodes
5. Best Practices
- Regularly update policies.
- Monitor and adjust access flows.
- Use descriptive names for nodes and rulesets.
6. Troubleshooting
- Verify node configuration.
- Check policy enforcement issues.
7. Conclusion
By following this guide, administrators can effectively set up and manage a federated adaptive access control system across multiple nodes and assets.