DEMO

Access policies

Attribute-based access control layered over entitlement grants. A subject needs a grant to act at all; any matching deny policy wins; where an allow policy claims a scope, its conditions must match. Policies are bitemporal — this screen shows the set in force at the snapshot below.

Viewing the current state
valid2026-05-19 23:05:58 system2026-05-19 23:05:58
Active policies
2
in force at this snapshot
Allow rules
0
condition-gated permits
Deny rules
2
override every allow
Subjects governed
2
named across all policies
Policy catalogue
2 of 2 policyies
Effect Policy Subject Scope Action Conditions
deny
deny-usd-instruments-api-20260519213907
Deny USD instruments 20260519213907
abac-api-20260519213907 instrument read 1 rule
deny
smoke-abac-policy-20260519204017607
Smoke ABAC policy
smoke-abac-subject-20260519204017607 instrument read 1 rule
Access simulator
Evaluate a request against grants & ABAC
Simulated — does not change who you are acting as.
Request context

No context attributes. Add request-time facts such as region or mfa that policies test via context.<key>.

Decision order: the subject must hold an entitlement grant; any matching deny wins; a matching allow must satisfy every condition.

An unhandled error has occurred. Reload ×

Rejoining the server...

Rejoin failed... trying again in seconds.

Failed to rejoin.
Please retry or reload the page.

The session has been paused by the server.

Failed to resume the session.
Please retry or reload the page.