Attribute-based access control terminology

Attribute-based access control involves the following components:

Terminology
Definition
Attributes
Attributes are the identifiers that indicate the correlation between a user and the Platform resources that they have access to. Attributes can be metadata added to an object, such as a label added to a schema field or segment. An administrator defines access policies that include attributes to manage user access permissions.
Labels
Labels allow you to categorize datasets and fields according to usage policies that apply to that data. Labels can be applied at any time, providing flexibility in how you choose to govern data. Best practices encourage labeling data as soon as it is ingested into Platform, or as soon as data becomes available for use in Platform.
Permissions
Permissions include the ability to view and/or use Platform features, such as creating sandboxes, defining schemas, and managing datasets.
Permission sets
Permission sets represent a group of permissions that an administrator can apply to a role. An administrator can assign permission sets to a role, instead of assigning individual permissions. This allows you to create custom roles from a pre-defined role that contains a group of permissions.
Policies
Policies are statements that bring attributes together to establish permissible and impermissible actions. Policies can either be local or global, and can override other policies.
Resource
A resource is the asset or object that a subject can or cannot access. Resources can be segments or schema fields.
Roles
Roles are ways to categorize the types of users that are interacting with your Platform instance and are building blocks of access control policies. In a role-based access control environment, user access provisioning is group through common responsibilities and needs. A role has a given set of permissions and members of your organization can be assigned to one or more roles, depending on the scope of view or write access they need.
Subject
A subject is the user requesting access to a resource to perform an action.
User groups
User groups are multiple users that have been grouped together and have the access to execute the same functions.

Permissions

IMPORTANT
Once your organization is enabled for attribute-based access control, you can start using Permissions on Adobe Experience Cloud, instead of Roles in the Adobe Admin Console, to manage permissions for users, functionality, labels, and other resources in your organization.

Permissions is the area of Experience Cloud where administrators can define user roles and access policies to manage access permissions for features and objects within a product application.

Through Permissions, you can create and manage roles, as well as assign the desired resource permissions for these roles. Permissions also allow you to manage the labels, sandboxes, and users associated with a specific role. For more information, see the Permissions guide.

Attribute-based access control API

The attribute-based access control API allows you to programmatically manage roles, policies, and products within Platform using APIs. For more information see the guide on using the API to manage attribute-based access control configurations.

Attribute-based access control in Adobe Experience Platform

The following sections provide information on how attribute-based access control is integrated to other components of Platform:

Access control

Platform leverages Adobe Admin Console roles to link users with permissions and sandboxes. Permissions control access to a variety of Platform capabilities, including data modeling, profile management, and sandbox administration. Once your organization is enabled for attribute-based access control, you can start using Permissions on Adobe Experience Cloud, instead of Roles in the Adobe Admin Console, to manage permissions for users, functionality, labels, and other resources in your organization.

There is limited availability to attribute-based access control for customers who purchase Healthcare and/or Privacy Shields. The features of this functionality include:

  • Permissions interface: Provides an interface for you to define user roles, permissions and policies for attribute-based access control.

  • Labeling: Add, edit, remove labels to user roles, schema fields, segments, and other supported objects in order to leverage access control policies. Note: Any segment that utilizes a labeled attribute must likewise be labeled if you want the same access restrictions to apply to it.

The administration workflows for all Experience Platform-powered applications from Admin Console to the new Permissions interface are being switched.

IMPORTANT
Your roles are automatically migrated to the Permissions interface when your organization is enabled. The roles in Admin Console will remain as is for the time being. Please do not modify your roles after your organization has been enabled.

For more information on access control, see the access control overview.