- Resources have different visibility levels (public, private, confidential)
- Access depends on resource state (draft, published, archived)
- Geographic or time-based restrictions apply
- Complex conditional logic combines multiple attributes
Public or private resources
Control access based on resource visibility. Public resources are readable by anyone, private resources require specific permissions.Common ABAC patterns
Explore these additional attribute-based patterns:Pattern | Description |
---|---|
Entitlements | Grant access based on subscription tiers or purchased features |
Time-based access | Grant roles and permissions that are time-bounded and can expire |
Conditional roles | Assign roles based on conditions like default roles and feature toggles |
Next steps
With your ABAC policy defined:- Add facts: Store resource attributes and user context in Oso Cloud
- Make authorization requests: Check permissions in your application code
- Test scenarios: Verify policies work with different attribute combinations