Creating PBAC Membership Policies
Manual group and role assignments create administrative overhead and risk outdated permissions as people change departments, join projects, or transfer locations. PBAC Membership Policies automate these assignments by evaluating user attributes in real-time, ensuring that access remains current without manual intervention.
PBAC Membership Policies define the conditions under which actors (such as people or Business Roles and Locations) are added to roles, groups, or collections. These policies use attribute-based rules to dynamically assign membership based on Field Types and their values.
Creating a PBAC Membership Policy is a two-step process: first create the policy (this article), then add attribute conditions that define which actors qualify for membership. For conceptual background, see Overview of PBAC Membership Policies.
This article demonstrates how to create a PBAC Membership Policy using the Role Modeling Inbox.
Prerequisites
Before creating PBAC Membership Policies, ensure you have:
- Administrative access to EmpowerID
- PBAC Field Types already created with appropriate values
- A target group, role, or collection to which the policy will assign members