Infisical home page
Search...
⌘K
Ask AI
Log In
Start for Free
Start for Free
Search...
Navigation
Access Control
Access Controls
Documentation
Integrations
CLI
API Reference
SDKs
Changelog
Getting Started
What is Infisical?
Quickstart
Guides
Setup
Platform
Organizations
Projects
Folders
Secrets
Internal PKI
Infisical SSH
Key Management (KMS)
KMS Configuration
Identities
Access Control
Overview
Role-based Access Controls
Attribute based access controls
Additional Privileges
Temporary Access
Assume Privileges
Access Requests
Project Access Requests
Approval Workflows
User Groups
Audit Logs
Secret Rotation
Dynamic Secrets
Gateway
Project Templates
Workflow Integrations
External Migrations
Admin Consoles
Secret Sharing
Secret Scanning
Authentication Methods
User Authentication
Machine Identities
Service Token
MFA
GitHub Team Sync
Self-host Infisical
Introduction
Installation methods
Linux Package
Upgrade Infisical Instance
Environment Variables
Hardware requirements
Guides
Reference architectures
Infisical Enterprise
FAQ
Internals
Overview
Permissions
Architecture
Security
Service tokens
Contributing
Getting Started
Contributing to platform
Contributing to SDK
Access Control
Access Controls
Learn about Infisical’s access control toolset.
To make sure that users and machine identities are only accessing the resources and performing actions they are authorized to, Infisical supports a wide range of access control tools.
Role-based Access Controls
Manage user and machine identitity permissions through predefined roles.
Attribute-based Access Control
Manage user and machine identitity permissions based on their attributes.
Additional Privileges
Add specific privileges to users and machines on top of their roles.
Temporary Access
Grant timed access to roles and specific privileges.
Access Requests
Enable users to request (temporary) access to sensitive resources.
Approval Workflows
Set up review policies for secret changes in sensitive environments.
Audit Logs
Track every action performed by user and machine identities in Infisical.
Was this page helpful?
Yes
No
Suggest edits
Raise issue
Machine Identities
Role-based Access Controls
Assistant
Responses are generated using AI and may contain mistakes.