Skip to main content
Myrmex provides a comprehensive Identity & Access Management (IAM) system that combines two complementary layers to give you granular, flexible control over your security infrastructure:
  • RBAC (Role-Based Access Control): Defines who can do what and where — through roles, permissions, and asset groups.
  • ABAC (Attribute-Based Access Control): Adds contextual conditions — time of day, source IP, MFA status, device type — through security policies.
Identity & Access Management Interface

Two Layers of Access Control

RBAC: Who Can Do What

Roles grant permissions (e.g., devices.read) scoped to specific organizations and contexts via Asset Groups. This is the base layer — without the right permission, access is always denied.

ABAC: Under Which Conditions

Security Policies add environmental conditions on top of RBAC. For example: “Deny device access outside business hours” or “Require MFA for integration management.”
How they work together: RBAC is evaluated first. If a user has the required permission, ABAC policies are then checked. Both layers must pass for access to be granted.

RBAC: Roles, Permissions & Asset Groups

To effectively manage access in Myrmex, it’s important to understand the relationship between these three core components:

How RBAC Works

Myrmex calculates effective access by combining all assigned roles and their respective scopes:
  • Additive Permissions: Combine roles to grant additional capabilities.
  • Cross-Functional Teams: Support users who work across multiple specialties or regions.
  • Temporary Access: Easily grant and revoke additional access by adding/removing roles.

ABAC: Security Policies

Security Policies allow you to enforce conditions beyond simple role assignments. They operate on top of RBAC permissions to restrict or allow access based on environmental attributes.

Common Use Cases

ScenarioPolicy EffectCondition
Block access outside business hoursDenytime_of_day not between 08:00–18:00
Require MFA for admin actionsDenymfa_status equals false
Allow access only from corporate networkDenysource_ip not in 10.0.0.0/8
Restrict Viewer role to weekdays onlyDenyday_of_week not in Mon–Fri, targeting Viewer role

Managing Policies

Step-by-step guide to creating, editing, and organizing security policies in the Myrmex interface.

Next Steps