Access Management Key Concepts

Learn about the key concepts and terms related to Access Management in RudderStack.

This guide covers the key concepts and terms related to the design and functionality of RudderStack’s Access Management system.

Policy-based Access Control (PBAC)

RudderStack’s Access Management system is based on Policy-based Access Control (PBAC).

info
Policy-based Access Control (PBAC) allows Admins to define granular permissions for resources and actions, and assign them to users directly via an access policy.

Additive permissions model

The Access Management system follows an additive permissions model, meaning permissions from the Baseline Workspace Policy, Group Workspace Policies, and Member Workspace Policy are combined.

Inherited permissions from lower levels cannot be removed at higher levels. Access only expands — it does not contract.

For example:

  • A baseline workspace policy might grant Edit permission on Event Stream Sources.
  • A group workspace policy might grant Connect permission on Event Stream Sources.
  • A member workspace policy might grant Create & Delete permission on Event Stream Sources.

The member’s effective access policy would then include all three permissions for Event Stream Sources.

Permission

A permission defines a specific action a user can take, like Edit, Connect, or Create & Delete. Permissions are the most granular building blocks of access and always refer to actions on specific resources, like sources, destinations, transformations, etc.

info
Permissions do not grant access by themselves — you must assign them to members via an access policy.

Access policy

A member’s access policy is the effective set of permissions they have in a workspace. It is computed by aggregating:

Workspace policy

A workspace policy is a named bundle of permissions. Policies can be:

  • Applied as Baseline, applicable to the entire workspace
  • Assigned to Groups created within the workspace
  • Assigned to individual Members in the workspace

Each policy defines what members can and cannot do in the given workspace.

Baseline Workspace Policy

Every workspace has one baseline policy that applies to all groups and members. This ensures consistent baseline access for all users, such as view-only permissions for resources or restricted access to PII.

Unless otherwise configured by an Admin, the baseline workspace policy is set to:

Group policies

Each group can have one workspace policy configured per workspace. Members of the group will inherit all permissions from both:

This allows Admins to create custom roles and share consistent access patterns without manual duplication.

Member policies

You can customize and configure a workspace policy for an individual member. This policy extends permissions from the Baseline Workspace Policy and Group Workspace Policies — it does not override them.


Questions? We're here to help.

Join the RudderStack Slack community or email us for support