Access policies
Attribute-based access control layered over entitlement grants. A subject needs a grant to act at all; any matching deny policy wins; where an allow policy claims a scope, its conditions must match. Policies are bitemporal — this screen shows the set in force at the snapshot below.
Active policies
2
Allow rules
0
Deny rules
2
Subjects governed
2
Policy catalogue
2 of 2 policyies
| Effect | Policy | Subject | Scope | Action | Conditions |
|---|---|---|---|---|---|
| deny | deny-usd-instruments-api-20260519213907
Deny USD instruments 20260519213907 |
abac-api-20260519213907 | instrument | read | 1 rule |
| deny | smoke-abac-policy-20260519204017607
Smoke ABAC policy |
smoke-abac-subject-20260519204017607 | instrument | read | 1 rule |
Access simulator
Evaluate a request against grants & ABAC
Simulated — does not change who you are acting as.
Request context
No context attributes. Add request-time facts such as region or mfa that policies test via context.<key>.
Decision order: the subject must hold an entitlement grant; any matching deny wins; a matching allow must satisfy every condition.