arrow-left

All pages
gitbookPowered by GitBook
1 of 4

Loading...

Loading...

Loading...

Loading...

Self Serve Access Flows

Create automated access policies for users to request access self-serve

Self serve access flows grant access to a resource based on a user request for a defined time period.

This access flow type is best used for sensitive or highly regulated resources, such as access to production. It also suits just-in-time (JIT) or break-glass access cases.

To create a self-serve access flow, you must define the permitted requestors, available resources, and approvers.

Create Access Flow page

hashtag
Prerequisites

Item
Description

hashtag
Define permitted requestors

Follow these steps to define the permitted requestors:

  1. On the page, click Create Access Flow. The Create Access Flow page appears.

circle-check

If is enabled, select a space from the space selector at the top of the page to create a space-specific access flow.

If no space is selected, the access flow will be created at the global account level.

  1. Click Self Serve. The Self Serve fields appear below.

  2. Enter an alphanumeric, user-friendly Access Flow Name.

  3. Click When. A settings window appears to set the access period.

circle-info

Other operators include the following:

  • Is not

  • Contains

  1. Click Select value to select one or multiple users or groups from the menu options. This selection determines who is permitted to request access.

  2. (Optional) Add another attribute.

    1. Under the last listed attribute, click +. A new row appears.

hashtag
Requesting Access on Behalf of Others

circle-check

What is it good for?

  • Onboarding new hires – Set up access before day one so they’re ready to go from the start.

  1. Click Themselves to define for whom the requestor can request resource access. An options menu appears.

  2. Select one or several options.

Option
Description
  1. (Others, Both) Define the other users:

    1. Click Select attribute to select an attribute, such as User or Group.

    2. (Optional) Click is to select conditional logic from the menu options.


hashtag
Define the resource

You can define access to specific resources in an Apono integration, bundle, or access scope.

circle-info

If you are creating an access flow within a space, only space-specific access scopes or bundles can be used to define the access flow’s resources.

Follow these steps to define access to specific resources:

  1. Under Request access to, click Select target > Integrations.

  2. Select an integration. The Select resource type panel appears.


hashtag
Set access duration and approval process

circle-check

Learn about .

Follow these steps to define the duration of access:

  1. Click in the populated Grant for field. The granting period settings appear.

    Period
    Description

hashtag
Set up custom approval

Approval of provides in-depth options to customize the approval flow. This approval type is ideal for production environments and highly sensitive resources.

Follow these steps to set up Approval of:

  1. Click the populated with field. The approval type menu appears.

  2. Click Approval of. The Approval of fields appear.

  3. Click Select attribute to select an IdP attribute, such as User, Group, or Owner.

circle-info

If you have connected an with Apono, the attribute can also be an on-call shift.

  1. (Optional) Click is to select conditional logic from the menu options.

circle-info

Other operators include the following:

  • Is not

  • Contains

  1. Click Select value to select one or multiple users or groups from the menu options. This selection determines who is permitted to approve access.

  2. (Optional) Add another approver condition.

    1. Immediately beneath the last list approver, click +. A new row appears.


hashtag
Enable IGA settings

Apono allows administrators to apply various settings to enhance the security of access flows.

circle-info

All admin settings are optional.

Setting
Description

Create Access Flows

Set the access period.
Period
Description

Always

(Default) Applies to the requester conditions at all times Follow this step to set this period:

  1. Select Always.

Only on

Applies to the requester conditions during a specific time frame Follow these steps to set a specific period:

  1. In the settings window, select Only on.

  2. Select one or more days of the week.

  3. In the From field, select a start time from the dropdown menu.

  • Click Select attribute to select an attribute, such as User or Group.

  • (Optional) Click is to select conditional logic from the menu options.

  • Does not contain

  • Starts with

  • Repeat steps 6-8.

  • Select the conditional logic for the multiple attributes.

    Condition
    Description

    AND

    (Default) Allows the user to request access if they meet all the selected attributes

    OR

    Allows the user to request access if they meet any of the selected attributes

  • Incident response – Get help from teammates fast, without involving Apono admins.
  • Contractors – Request narrow, temporary access for external contractors.

  • Team enablement – Empower managers to request access for their team members.

  • Click Select value to select one or multiple users or groups from the menu options. This selection determines for whom access can be requested.

  • (Optional) Add another attribute.

    1. Under the last listed attribute, click +. A new row appears.

    2. Repeat steps 12a-c.

    3. Select the conditional logic for the multiple attributes.

      Condition
      Description
  • Select the resource type.
  • Click Done. The panel closes.

  • Click permissions. The Permissions menu appears.

  • Select one or more permissions to grant the requester.

  • (Optional) Refine the available resources:

    1. Click in the populated to field. A list of resources appears.

    2. Select one or several resources.

  • circle-info

    By default, the user has access to Any resources. However, the following options allow you to define access more granularly:

    • Any resources except specific

    • Select by name

    • Select by tags

    1. (Optional) Add another target:

      1. Click + at the end of the row. A new target row appears.

      2. Repeat steps 1-7 or add a bundle or access scope.

    circle-check

    To ensure you do not exceed the AWS inline policy character limit, read AWS Limitations when adding bundles with AWS resources.

    Follow these steps to define access to a specific bundle:

    1. Under Request access to, click Select target > Bundles.

    2. (Optional) Click (eye icon). A Preview Bundle pop-up window appears displaying the contents of the bundle.

    3. Select a bundle.

    circle-check

    You can also click + Create new bundle if none of the existing bundles meet your needs. The Create Bundle page appears. You can a new bundle.

    1. (Optional) To add another bundle, click +. A new target row appears.

    2. Repeat steps 1-2 or add an or .

    Follow these steps to define access to a specific access scope:

    1. Under Request access to, click Select target > Access Scope. The Select access scope menu appears.

    circle-check

    You may enter keywords into the search bar to locate an access scope.

    1. (Optional) Click (eye icon). A Preview Access Scope pop-up window appears displaying the contents of the access scope.

    2. Select an access scope.

    circle-check

    You can also click + Create New Access Scope if none of the existing access scopes meet your needs. The Inventory page appears. You can and the new access scope.

    1. (Optional) To add another access scope, click +. A new target row appears.

    2. Repeat steps 1-3 or add an or .

    Click Automatic to select the approval type.
    Period
    Description

    Automatic

    Automatically grants the requester access for the specified period Automatic approval is the default setting.

    Approval of

    Grants the requester access for the specified period upon the approval of certain parties For more information, learn how to .

  • Click Create Access Flow.

  • Does not contain

  • Starts with

  • Repeat steps 3-5 to add another approver to the group.

  • Select the conditional logic for the multiple approvers.

    Condition
    Description

    AND

    (Default) If you have multiple attributes in the approval group, AND requires the approver to meet all the attributes.

    OR

    If you have multiple attributes in the approval group, OR requires the approver to meet only one of the attributes.

  • (Optional) Add another approver group.

    1. Beneath the last approver group, click +. A new approval group appears.

    2. Repeat steps 3-5 to add another approver to the group.

    3. Select the conditional logic for the multiple groups of approvers.

      Condition
      Description
  • Cloud resources

    One or more resources in a cloud platform that has been integrated with Apono

    If you have not already, integrate Apono with a cloud platform to control access to its resources:

    • AWS integrations

    • Azure integrations

    Apono identities

    One or more identity sources in the Apono system There are various ways to add identities to Apono:

    • Integrate an identity provider

    • Invite a user manually

    Themselves

    (Default) Allows the requestor to only request resource access for himself or herself

    Direct Reports

    Allows the requestor, identified as a manager in the organization’s identity provider (IdP), to request resource access solely for individuals formally assigned as direct reports in the IdP

    Others (specify)

    Allows the requestor to only request resource access on behalf of others (grantees)

    Custom

    (Default) Grants the requester access for a custom period The default granting period is set to 1 hour. Follow these steps to grant access for a custom period:

    1. Select the first radio button.

    2. From the right dropdown menu, select a time unit.

    3. In the first field, enter a numerical value for the time unit.

    4. In the second field, select a time unit from the dropdown menu.

    Indefinite

    Grants the requester access indefinitely Follow this step to set this period:

    1. Click Indefinite.

    Access flow labels

    Identifies an access flow for streamlined organization and use

    When assigned to an access flow, labels appear in the access flow tiles on the Access Flowsarrow-up-right page.

    Follow these steps:

    1. Enter a value.

    2. Press Enter on your keyboard or select an existing label from the filtered list.

    Require MFA

    Requires grantees to complete multi-factor authentication to complete a request

    We strongly recommend enabling MFA for access requests to sensitive resources.

    The grantee will need to enable multi-factor authentication.

    Follow this step:

    1. Click the toggle. When enabled, the toggle turns green.

    Require justification

    Requires grantees to enter a justification for their request

    Follow this step:

    1. Click the toggle. When enabled, the toggle turns green.

    Require Approver Reason

    Requires approvers to provide a reason (limited to 124 characters) when approving or rejecting a request

    If disabled, providing a reason is optional.

    Follow this step:

    1. Click the toggle. When enabled, the toggle turns green.

    Requester and grantee cannot self approve

    Prevents users from approving their own access requests

    If the user is a member of an approval group, they will not receive a notification to approve the request.

    Follow this step:

    1. Click the toggle. When enabled, the toggle turns green.

    Allow extending request

    Allows requestors to extend active access for a limited duration without submitting a new request

    Follow these steps:

    1. Click the toggle. When enabled, the toggle turns green.

    2. Click in the Allow extending request up to field to choose the number of times the request can be extended, up to a maximum of 10.

    3. Click in the Extend for fields to select the duration of each extension, up to the maximum access duration set for the access flow. The default duration is 30 minutes per extension.

    Credential rotation, user cleanup, MFA, and approval requirements apply only to new access requests. Extending access preserves the existing session, user, and credentials.

    Access Flowsarrow-up-right
    Space Management
    access duration and best practices
    incident response integration
    Defining permitted requestors
    Defining integration, access scope, and bundle resources
    Access duration and approval process
    Custom approval flow
    Access flow settings

    In the to field, select an end time from the dropdown menu.

  • Select a timezone from the dropdown menu.

  • AND

    (Default) Allows the user to request access if they meet all the selected attributes

    OR

    Allows the user to request access if they meet any of the selected attributes

    ANY OF

    If you have multiple approval groups, ANY OF only requires one approver belonging to any group to approve access.

    ALL OF

    If you have multiple approval groups, ALL OF requires one approver per group to approve access.

    create
    integration
    access scope
    create
    use
    integration
    bundle
    GCP integrations
    Kubernetes integrations
    set up custom approval

    Access Duration

    Require requestors to specify their desired access duration to ensure least privilege

    Access duration defines how long access is granted to requestors. When this feature is enabled, admins require requestors to specify how long they need access, up to a maximum duration set within a self-service access flowarrow-up-right.

    By enforcing time limits, access duration reduces standing access, improves accountability, and supports just-in-time access aligned with the principle of least privilege.

    When a request is submitted, the approver sees the requested duration along with other request details. Once approved, access is granted only for the specified period and is revoked when the access duration expires. If the requestor needs more time, a new access request should be submitted unless extended access has been enabled for the access flow.

    circle-info

    All Apono access requests, approvals, and expirations are logged and retained for at least 36 months. For longer retention needs, export this data to your organization’s storage tools.


    hashtag
    Enable access duration

    By default, access duration is disabled. We recommend enabling the following setting so access is granted only for the minimum time required to complete a task.

    Follow this step to enable access duration:

    1. On the page, click the Require duration for access request toggle to on. The toggle will turn green.

    Once enabled, requestors must specify a duration, up to the defined by the access flow. If the requested duration exceeds the limit or is invalid, an error message prompts the requestor to enter a valid duration.


    hashtag
    Access duration best practices

    Access duration should be based on the risk and sensitivity of an access flow's resources. Use the following recommendations as a starting point to define durations that meet your organization’s security and operational needs.

    Typical Requested Duration reflects how long access is usually needed to complete a task. Access Duration defines the upper limit enforced by the access flow.

    Use Case
    Typical Requested Duration
    Access Duration
    Approval Type (UI)
    Settings (UI) & Guidance
    circle-check

    After access durations are defined, Apono analyzes access requests and identifies Excessive access duration when requested durations are consistently below the configured maximum.

    Through , Apono recommends reviewing and reducing the maximum access duration to better align with least-privilege access.

    Sensitive Data (PII, Financial, Customer)

    Up to 1 hour

    2 hours

    Approval of

    Settings:

    • Require Approver Reason

    • Requester and grantee cannot self approve

    Guidance:

    The approver should be able to authorize sensitive data access such as Security team, GRC, or manager.

    Break-glass / Emergency

    Up to 1 hour

    2 hours

    Approval of

    OR

    Automatic Approval

    Setting:

    • Require MFA

    Guidance:

    • The request should be reviewed post-incident.

    Development / Sandbox / Staging / QA

    Quarterly

    Conditional, based on role

    Automatic Approval

    Guidance:

    Longer durations are acceptable due to lower risk, especially when tied to developer roles.

    Production Systems

    Up to 2 hours

    4 hours

    Approval of

    OR

    Automatic Approval

    Settings:

    • Require MFA

    • Requester and grantee cannot self approve

    Guidance:

    • Approval of: Choose an approver from a production team, such as DevOps or Infra.

    • Automatic Approval: Select this approval type for ongoing incidents or during on-call shifts.

    Settingsarrow-up-right
    maximum access durationarrow-up-right
    Right Sizingarrow-up-right
    Require duration for access request toggle

    Automatic Access Flows

    Automatic access flows automatically grant and revoke access to a resource based on user context. This access flow type is best used for role-based access control (RBAC) and on-call shift baselines.

    To create an automatic access flow, you must define the permitted users and available resources.

    Create Access Flow page

    hashtag
    Prerequisites

    Item
    Description

    hashtag
    Define permitted users

    Follow these steps to define the permitted grantees:

    1. On the page, click Create Access Flow. The Create Access Flow page appears.

    circle-check

    If is enabled, select a space from the space selector at the top of the page to create a space-specific access flow.

    If no space is selected, the access flow will be created at the global account level.

    1. Click Automatic. The Automatic fields appear below.

    2. Enter an alphanumeric, user-friendly Access Flow Name.

    3. Click Select attribute to select an IdP attribute, such as User or Group.

    circle-info

    Other operators include the following:

    • Is not

    • Contains

    1. Click Select value to select one or multiple users or groups from the menu options. This selection determines who is permitted to request access.

    2. (Optional) Add another user.

      1. Under the last listed requestor, click +. A new row appears.


    hashtag
    Define the resource

    You can define access to specific resources in an Apono integration, bundle, or access scope.

    circle-info

    If you are creating an access flow within a space, only space-specific access scopes or bundles can be used to define the access flow’s resources.

    circle-check

    To ensure you do not exceed the AWS inline policy character limit, read when adding AWS resources.

    Follow these steps to define access to specific resources:

    1. Under They will have access to, click Select target > Integrations.


    hashtag
    Add a label

    Follow this step to add an access flow label:

    1. In the Access flow labels, enter a value and press Enter OR select an existing label.

    circle-info

    A label identifies an access flow for streamlined organization and use. When assigned to an access flow, labels appear in the access flow tiles on the page.


    hashtag
    Review the access flow

    After defining the and , follow these steps to review and save an automatic access flow:

    1. Click Review and Create. The Automatic Access Flow Summary appears.

    circle-info

    The access flow summary provides a visual overview of the relationship between the requesters and the target resource.

    1. Click Create and Grant.

    Ticket ID may be required to make the request
  • Approval of: Choose an approver from an on-call shift or production team, such as DevOps or Infra.

  • Automatic Approval: Select this approval type for ongoing incidents or during on-call shifts.

  • (Optional) Click is to select conditional logic from the menu options.

    Does not contain

  • Starts with

  • Repeat steps 4-7.

  • Select the conditional logic for the multiple requestors.

    Condition
    Description

    AND

    (Default) Allows the user to request access if they meet all the attributes of the user group

    OR

    Allows the user to request access if they meet any of the attributes of the user group

  • Select an integration. The Select resource type panel appears.

  • Select the resource type.

  • Click Done. The panel closes.

  • Click permissions. The Permissions menu appears.

  • Select one or more permissions to grant the requester.

  • (Optional) Refine the available resources:

    1. Click in the populated to field. A list of resources appears.

    2. Select one or several resources.

  • circle-info

    By default, the user has access to Any resources. However, the following options allow you to define access more granularly:

    • Any resources except specific

    • Select by name

    • Select by tags

    1. (Optional) Add another target:

      1. Click + at the end of the row. A new target row appears.

      2. Repeat steps 1-7 or add a bundle or access scope.

    circle-check

    To ensure you do not exceed the AWS inline policy character limit, read AWS Limitations when adding bundles with AWS resources.

    Follow these steps to define access to a specific bundle:

    1. Under They will have access to, click Select target > Bundles.

    2. Select a bundle.

    3. (Optional) To add another bundle, click +. A new target row appears.

    4. Repeat steps 1-2 or add an or .

    Follow these steps to define access to a specific access scope:

    1. Under They will have access to, click Select target > Access Scope. The Select access scope menu appears.

    circle-check

    You may enter keywords into the search bar to locate an access scope.

    1. (Optional) Click (eye icon) to preview the contents of the access scope in a popup window.

    2. Select an access scope.

    circle-check

    You can also click + Create New Access Scope if none of the existing access scopes meet your needs. The Inventory page appears. You can and the new access scope.

    1. (Optional) To add another access scope, click +. A new target row appears.

    2. Repeat steps 1-3 or add an or .

    Cloud resources

    One or more resources in a cloud platform that has been integrated with Apono If you have not already, integrate Apono with a cloud platform to control access to its resources:

    • AWS integrations

    • Azure integrations

    • GCP integrations

    Apono identities

    One or more identity sources in the Apono system There are various ways to add identities to Apono:

    • Integrate an identity provider

    • Invite a user manually

    Access Flowsarrow-up-right
    Space Management
    AWS Limitations
    Access Flowsarrow-up-right
    permitted users
    resource
    Defining grantees
    Defining resources
    Settings section
    integration
    access scope
    create
    use
    integration
    bundle
    Kubernetes integrations