Infisical home pagelight logodark logo
  • Log In
  • Start for Free
  • Start for Free
Access Control
Access Controls
Documentation
Integrations
CLI
API Reference
SDKs
Changelog
Getting Started
  • What is Infisical?
  • Quickstart
  • Guides
  • Setup
Platform
  • Organizations
  • Projects
  • Folders
  • Secrets
  • Internal PKI
  • Infisical SSH
  • Key Management (KMS)
  • KMS Configuration
  • Identities
  • Access Control
    • Overview
    • Role-based Access Controls
    • Attribute based access controls
    • Additional Privileges
    • Temporary Access
    • Assume Privileges
    • Access Requests
    • Project Access Requests
    • Approval Workflows
    • User Groups
  • Audit Logs
  • Secret Rotation
  • Dynamic Secrets
  • Gateway
  • Project Templates
  • Workflow Integrations
  • Admin Consoles
  • Secret Sharing
  • Secret Scanning
Authentication Methods
  • Email and Password
  • Service Token
  • Token Auth
  • Universal Auth
  • Kubernetes Auth
  • GCP Auth
  • Azure Auth
  • AWS Auth
  • JWT Auth
  • OIDC Auth
  • MFA
  • SSO
  • LDAP
  • SCIM
  • GitHub Team Sync
Self-host Infisical
  • Introduction
  • Installation methods
  • Linux Package
  • Upgrade Infisical Instance
  • Configurations
  • Hardware requirements
  • Guides
  • Reference architectures
  • Infisical Enterprise
  • FAQ
Internals
  • Overview
  • Permissions
  • Components
  • Security
  • Bug bounty program
  • Service tokens
Contributing
  • Getting Started
  • Contributing to platform
  • Contributing to SDK
Access Control

Access Controls

Learn about Infisical’s access control toolset.

To make sure that users and machine identities are only accessing the resources and performing actions they are authorized to, Infisical supports a wide range of access control tools.

Role-based Access Controls

Manage user and machine identitity permissions through predefined roles.

Attribute-based Access Control

Manage user and machine identitity permissions based on their attributes.

Additional Privileges

Add specific privileges to users and machines on top of their roles.

Temporary Access

Grant timed access to roles and specific privileges.

Access Requests

Enable users to request (temporary) access to sensitive resources.

Approval Workflows

Set up review policies for secret changes in sensitive environments.

Audit Logs

Track every action performed by user and machine identities in Infisical.

Was this page helpful?

Suggest editsRaise issue
Machine IdentitiesRole-based Access Controls
Infisical home pagelight logodark logo
xlinkedingithubslack

PRODUCT

Secret ManagementSecret ScanningShare SecretsPricingSecurityBlogInfisical vs VaultForum

USE CASES

Infisical AgentKubernetesDynamic SecretsTerraformAnsibleJenkinsDockerAWS ECSGitLabGitHubSDK

DEVELOPERS

ChangelogStatusFeedback & RequestsTrust of CenterOpen Source FriendsHow to contribute

OTHERS

CustomersCompany HandbookCareersTerms of ServicePrivacy PolicySubprocessorsSLATeam EmailSalesSupport
Powered by Mintlify