Infisical home page
Search...
⌘K
Ask AI
Log In
Start for Free
Start for Free
Search...
Navigation
Access Control
Access Controls
Platform
Products
CLI Reference
API Reference
SDKs
Changelog
Getting Started
Overview
What is Infisical?
Concepts
Guides
Platform Reference
Organizations
Projects
Identities
Access Control
Overview
Role-based Access Controls
Attribute based access controls
Additional Privileges
Temporary Access
Assume Privileges
Access Requests
Project Access Requests
Approval Workflows
User Groups
Audit Logs
App Connections
Events
Workflow Integrations
External Migrations
Server Admin Console
Secret Sharing
Connectivity
Networking
Gateway
Authentication Methods
User Authentication
Machine Identities
Machine Identity Auth Templates
Service Token
MFA
GitHub Team Sync
Self-host Infisical
Introduction
Installation methods
Linux Package
Upgrade Infisical Instance
Environment Variables
Release Channels
Hardware requirements
Guides
Reference architectures
Infisical Enterprise
FAQ
Internals
Overview
Permissions
Architecture
Security
Service tokens
Contributing
Getting Started
Contributing to platform
Access Control
Access Controls
Learn about Infisical’s access control toolset.
To make sure that users and machine identities are only accessing the resources and performing actions they are authorized to, Infisical supports a wide range of access control tools.
Role-based Access Controls
Manage user and machine identitity permissions through predefined roles.
Attribute-based Access Control
Manage user and machine identitity permissions based on their attributes.
Additional Privileges
Add specific privileges to users and machines on top of their roles.
Temporary Access
Grant timed access to roles and specific privileges.
Access Requests
Enable users to request (temporary) access to sensitive resources.
Approval Workflows
Set up review policies for secret changes in sensitive environments.
Audit Logs
Track every action performed by user and machine identities in Infisical.
Was this page helpful?
Yes
No
Suggest edits
Raise issue
Machine Identities
Role-based Access Controls
Assistant
Responses are generated using AI and may contain mistakes.