arrow-left
All pages
gitbookPowered by GitBook
1 of 4

Loading...

Loading...

Loading...

Loading...

Create Access Flows

Access Duration

Require requestors to specify their desired access duration to ensure least privilege

Access Duration refers to the amount of time access will be open to requestors.

By enabling this feature, admins require requestors to specify the access time they will need out of the maximum allowed.

This enhances security and accountability by requiring users to specify the length of access needed for each request.

When a user submits a request, the approver sees the requested duration along with other request details. Upon approval, the user is granted access for the specified period.


hashtag
Enable the Access Duration setting

By default, access duration is disabled. We recommend enabling this setting to keep open access down to the minimum amount of time needed for a specific task.

Follow this step to enable access duration:

  1. On the page, click the Require duration for access request toggle to on. The toggle will turn green.

Once the setting has been enabled, users must specify their access duration, up to the set by the admin. If the requested duration exceeds the limit, an error message will appear. Entering zero or an invalid value prompts the user to reenter a valid duration.

circle-info

Enabling picking access duration for Access Right Sizing

Apono analyzes your Access Flows and provides right-sizing recommendations.

When access duration is enabled, Apono compares the requested duration to the maximum allowed and suggests shorter duration times for Least Privilege:


hashtag
Pick the duration in an access request

Once enabled, users requesting access will be asked to enter their desired access duration when making requests.

When users create a new request, they will see the Access duration (in hours) field.

Users may pick any duration, including fractions, up to the maximum allowed per resource and permission.

If users attempt to request more than the allowed duration, they will receive a warning to pick a shorter duration.

When users create a new request, they will see the Duration (in Hours) field.

Users may pick any duration, including fractions, up to the maximum allowed per resource and permission.

If users attempt to request more than the allowed duration, they will receive a warning to pick a shorter duration.

When users create a new request, they will see the Duration prompt.

Users may pick any duration, including fractions, up to the maximum allowed per resource and permission.

If users attempt to request more than the allowed duration, they will receive a warning to pick a shorter duration.

Settingsarrow-up-right
maximum access duration
Require duration for access request toggle

Automatic Access Flows

Automatic access flows automatically grant and revoke access to a resource based on user context. This access flow type is best used for role-based access control (RBAC) and on-call shift baselines.

To create an automatic access flow, you must define the permitted users and available resources.

Create Access Flow page

hashtag
Prerequisites

Item
Description

hashtag
Define permitted users

Follow these steps to define the permitted grantees:

  1. On the page, click Create Access Flow. The Create Access Flow page appears.

circle-check

If is enabled, select a space from the space selector at the top of the page to create a space-specific access flow.

If no space is selected, the access flow will be created at the global account level.

  1. Click Automatic. The Automatic fields appear below.

  2. Enter an alphanumeric, user-friendly Access Flow Name.

  3. Click Select attribute to select an IdP attribute, such as User or Group.

  4. (Optional) Click is

circle-info

Other operators include the following:

  • Is not

  • Contains

  1. Click Select value to select one or multiple users or groups from the menu options. This selection determines who is permitted to request access.

  2. (Optional) Add another user.

    1. Under the last listed requestor, click +. A new row appears.

    2. Repeat steps 4-7.


hashtag
Define the resource

You can define access to specific resources in an Apono integration, bundle, or access scope.

circle-info

If you are creating an access flow within a space, only space-specific access scopes or bundles can be used to define the access flow’s resources.

circle-check

To ensure you do not exceed the AWS inline policy character limit, read when adding AWS resources.

Follow these steps to define access to specific resources:

  1. Under They will have access to, click Select target > Integrations.

  2. Select an integration. The


hashtag
Add a label

Follow this step to add an access flow label:

  1. In the Access flow labels, enter a value and press Enter OR select an existing label.

circle-info

A label identifies an access flow for streamlined organization and use. When assigned to an access flow, labels appear in the access flow tiles on the page.


hashtag
Review the access flow

After defining the and , follow these steps to review and save an automatic access flow:

  1. Click Review and Create. The Automatic Access Flow Summary appears.

circle-info

The access flow summary provides a visual overview of the relationship between the requesters and the target resource.

  1. Click Create and Grant.

to select conditional logic from the menu options.
Does not contain
  • Starts with

  • Select the conditional logic for the multiple requestors.

    Condition
    Description

    AND

    (Default) Allows the user to request access if they meet all the attributes of the user group

    OR

    Allows the user to request access if they meet any of the attributes of the user group

    Select resource type
    panel appears.
  • Select the resource type.

  • Click Done. The panel closes.

  • Click permissions. The Permissions menu appears.

  • Select one or more permissions to grant the requester.

  • (Optional) Refine the available resources:

    1. Click in the populated to field. A list of resources appears.

    2. Select one or several resources.

  • circle-info

    By default, the user has access to Any resources. However, the following options allow you to define access more granularly:

    • Any resources except specific

    • Select by name

    • Select by tags

    1. (Optional) Add another target:

      1. Click + at the end of the row. A new target row appears.

      2. Repeat steps 1-7 or add a bundle or access scope.

    circle-check

    To ensure you do not exceed the AWS inline policy character limit, read AWS Limitations when adding bundles with AWS resources.

    Follow these steps to define access to a specific bundle:

    1. Under They will have access to, click Select target > Bundles.

    2. Select a bundle.

    3. (Optional) To add another bundle, click +. A new target row appears.

    4. Repeat steps 1-2 or add an or .

    Follow these steps to define access to a specific access scope:

    1. Under They will have access to, click Select target > Access Scope. The Select access scope menu appears.

    circle-check

    You may enter keywords into the search bar to locate an access scope.

    1. (Optional) Click (eye icon) to preview the contents of the access scope in a popup window.

    2. Select an access scope.

    circle-check

    You can also click + Create New Access Scope if none of the existing access scopes meet your needs. The Inventory page appears. You can and the new access scope.

    1. (Optional) To add another access scope, click +. A new target row appears.

    2. Repeat steps 1-3 or add an or .

    Cloud resources

    One or more resources in a cloud platform that has been integrated with Apono If you have not already, integrate Apono with a cloud platform to control access to its resources:

    • AWS integrations

    • Azure integrations

    • GCP integrations

    Apono identities

    One or more identity sources in the Apono system There are various ways to add identities to Apono:

    • Integrate an identity provider

    • Invite a user manually

    Access Flowsarrow-up-right
    Space Management
    AWS Limitations
    Access Flowsarrow-up-right
    permitted users
    resource
    Defining grantees
    Defining resources
    Settings section
    integration
    access scope
    create
    use
    integration
    bundle
    Kubernetes integrations

    Self Serve Access Flows

    Create automated access policies for users to request access self-serve

    Self serve access flows grant access to a resource based on a user request for a defined time period.

    This access flow type is best used for sensitive or highly regulated resources, such as access to production. It also suits just-in-time (JIT) or break-glass access cases.

    To create a self-serve access flow, you must define the permitted requestors, available resources, and approvers.

    Create Access Flow page

    hashtag
    Prerequisites

    Item
    Description

    hashtag
    Define permitted requestors

    Follow these steps to define the permitted requestors:

    1. On the page, click Create Access Flow. The Create Access Flow page appears.

    circle-check

    If is enabled, select a space from the space selector at the top of the page to create a space-specific access flow.

    If no space is selected, the access flow will be created at the global account level.

    1. Click Self Serve. The Self Serve fields appear below.

    2. Enter an alphanumeric, user-friendly Access Flow Name.

    3. Click When. A settings window appears to set the access period.

    4. Set the access period.

    circle-info

    Other operators include the following:

    • Is not

    • Contains

    1. Click Select value to select one or multiple users or groups from the menu options. This selection determines who is permitted to request access.

    2. (Optional) Add another attribute.

      1. Under the last listed attribute, click +. A new row appears.

      2. Repeat steps 6-8.

    hashtag
    Requesting Access on Behalf of Others

    circle-check

    What is it good for?

    • Onboarding new hires – Set up access before day one so they’re ready to go from the start.

    • Incident response – Get help from teammates fast, without involving Apono admins.

    1. Click Themselves to define for whom the requestor can request resource access. An options menu appears.

    2. Select one or several options.

    Option
    Description
    1. (Others, Both) Define the other users:

      1. Click Select attribute to select an attribute, such as User or Group.

      2. (Optional) Click is to select conditional logic from the menu options.

      3. Click Select value


    hashtag
    Define the resource

    You can define access to specific resources in an Apono integration, bundle, or access scope.

    circle-info

    If you are creating an access flow within a space, only space-specific access scopes or bundles can be used to define the access flow’s resources.

    Follow these steps to define access to specific resources:

    1. Under Request access to, click Select target > Integrations.

    2. Select an integration. The Select resource type panel appears.

    3. Select the resource type.


    hashtag
    Set access duration and approval process

    Follow these steps to define the duration of access:

    1. Click in the populated Grant for field. The granting period settings appear.

      Period
      Description
    2. Click Automatic to select the approval type.

    hashtag
    Set up custom approval

    Approval of provides in-depth options to customize the approval flow. This approval type is ideal for production environments and highly sensitive resources.

    Follow these steps to set up Approval of:

    1. Click the populated with field. The approval type menu appears.

    2. Click Approval of. The Approval of fields appear.

    3. Click Select attribute to select an IdP attribute, such as User, Group, or Owner.

    circle-info

    If you have connected an with Apono, the attribute can also be an on-call shift.

    1. (Optional) Click is to select conditional logic from the menu options.

    circle-info

    Other operators include the following:

    • Is not

    • Contains

    1. Click Select value to select one or multiple users or groups from the menu options. This selection determines who is permitted to approve access.

    2. (Optional) Add another approver condition.

      1. Immediately beneath the last list approver, click +. A new row appears.

      2. Repeat steps 3-5 to add another approver to the group.


    hashtag
    Enable IGA settings

    Apono allows administrators to apply various settings to enhance the security of access flows.

    circle-info

    All admin settings are optional.

    Follow these steps to configure settings:

    1. In the Access flow labels, enter a value and press Enter OR select an existing label.

    circle-info

    A label identifies an access flow for streamlined organization and use. When assigned to an access flow, labels appear in the access flow tiles on the page.

    1. Click the toggle to enable any of the following settings. When enabled, the toggle turns green.

    Setting
    Description
    Period
    Description

    Always

    (Default) Applies to the requester conditions at all times Follow this step to set this period:

    1. Select Always.

    Only on

    Applies to the requester conditions during a specific time frame Follow these steps to set a specific period:

    1. In the settings window, select Only on.

    2. Select one or more days of the week.

    3. In the From field, select a start time from the dropdown menu.

  • Click Select attribute to select an attribute, such as User or Group.

  • (Optional) Click is to select conditional logic from the menu options.

  • Does not contain
  • Starts with

  • Select the conditional logic for the multiple attributes.

    Condition
    Description

    AND

    (Default) Allows the user to request access if they meet all the selected attributes

    OR

    Allows the user to request access if they meet any of the selected attributes

    Contractors – Request narrow, temporary access for external contractors.

  • Team enablement – Empower managers to request access for their team members.

  • to select one or multiple users or groups from the menu options. This selection determines for whom access can be requested.
  • (Optional) Add another attribute.

    1. Under the last listed attribute, click +. A new row appears.

    2. Repeat steps 12a-c.

    3. Select the conditional logic for the multiple attributes.

      Condition
      Description
  • Click Done. The panel closes.
  • Click permissions. The Permissions menu appears.

  • Select one or more permissions to grant the requester.

  • (Optional) Refine the available resources:

    1. Click in the populated to field. A list of resources appears.

    2. Select one or several resources.

  • circle-info

    By default, the user has access to Any resources. However, the following options allow you to define access more granularly:

    • Any resources except specific

    • Select by name

    • Select by tags

    1. (Optional) Add another target:

      1. Click + at the end of the row. A new target row appears.

      2. Repeat steps 1-7 or add a bundle or access scope.

    circle-check

    To ensure you do not exceed the AWS inline policy character limit, read AWS Limitations when adding bundles with AWS resources.

    Follow these steps to define access to a specific bundle:

    1. Under Request access to, click Select target > Bundles.

    2. (Optional) Click (eye icon). A Preview Bundle pop-up window appears displaying the contents of the bundle.

    3. Select a bundle.

    circle-check

    You can also click + Create new bundle if none of the existing bundles meet your needs. The Create Bundle page appears. You can a new bundle.

    1. (Optional) To add another bundle, click +. A new target row appears.

    2. Repeat steps 1-2 or add an or .

    Follow these steps to define access to a specific access scope:

    1. Under Request access to, click Select target > Access Scope. The Select access scope menu appears.

    circle-check

    You may enter keywords into the search bar to locate an access scope.

    1. (Optional) Click (eye icon). A Preview Access Scope pop-up window appears displaying the contents of the access scope.

    2. Select an access scope.

    circle-check

    You can also click + Create New Access Scope if none of the existing access scopes meet your needs. The Inventory page appears. You can and the new access scope.

    1. (Optional) To add another access scope, click +. A new target row appears.

    2. Repeat steps 1-3 or add an or .

    Period
    Description

    Automatic

    Automatically grants the requester access for the specified period Automatic approval is the default setting.

    Approval of

    Grants the requester access for the specified period upon the approval of certain parties For more information, learn how to .

  • Click Create Access Flow.

  • Does not contain
  • Starts with

  • Select the conditional logic for the multiple approvers.

    Condition
    Description

    AND

    (Default) If you have multiple attributes in the approval group, AND requires the approver to meet all the attributes.

    OR

    If you have multiple attributes in the approval group, OR requires the approver to meet only one of the attributes.

  • (Optional) Add another approver group.

    1. Beneath the last approver group, click +. A new approval group appears.

    2. Repeat steps 3-5 to add another approver to the group.

    3. Select the conditional logic for the multiple groups of approvers.

      Condition
      Description
  • Cloud resources

    One or more resources in a cloud platform that has been integrated with Apono

    If you have not already, integrate Apono with a cloud platform to control access to its resources:

    • AWS integrations

    • Azure integrations

    • GCP integrations

    Apono identities

    One or more identity sources in the Apono system There are various ways to add identities to Apono:

    • Integrate an identity provider

    • Invite a user manually

    Themselves

    (Default) Allows the requestor to only request resource access for himself or herself

    Direct Reports

    Allows the requestor, identified as a manager in the organization’s identity provider (IdP), to request resource access solely for individuals formally assigned as direct reports in the IdP

    Others (specify)

    Allows the requestor to only request resource access on behalf of others (grantees)

    Custom

    (Default) Grants the requester access for a custom period The default granting period is set to 1 hour. Follow these steps to grant access for a custom period:

    1. Select the first radio button.

    2. From the right dropdown menu, select a time unit.

    3. In the first field, enter a numerical value for the time unit.

    4. In the second field, select a time unit from the dropdown menu.

    Indefinite

    Grants the requester access indefinitely Follow this step to set this period:

    1. Click Indefinite.

    Require MFA

    Requires grantees to complete multi-factor authentication to complete a request We strongly recommend enabling MFA for access requests to sensitive resources.

    The grantee will need to enable multi-factor authentication.

    Require justification

    Requires grantees to enter a justification for their request

    Require Approve Reason

    Requires approvers to provide a reason (limited to 124 characters) when approving or rejecting a request.

    If disabled, providing a reason is optional.

    Requester cannot approve their own request

    Prevents users from approving their own access requests

    If the user is a member of an approval group, they will not receive a notification to approve the request.

    Access Flowsarrow-up-right
    Space Management
    incident response integration
    Access Flowsarrow-up-right
    Defining permitted requestors
    Defining integration, access scope, and bundle resources
    Access duration and approval process
    Custom approval flow
    Access flow settings
    In the to field, select an end time from the dropdown menu.
  • Select a timezone from the dropdown menu.

  • AND

    (Default) Allows the user to request access if they meet all the selected attributes

    OR

    Allows the user to request access if they meet any of the selected attributes

    ANY OF

    If you have multiple approval groups, ANY OF only requires one approver belonging to any group to approve access.

    ALL OF

    If you have multiple approval groups, ALL OF requires one approver per group to approve access.

    create
    integration
    access scope
    create
    use
    integration
    bundle
    Kubernetes integrations
    set up custom approval