Skip to main content

Policy Configuration Guide

Introduction to Policy-Based Access Control

Authnull uses a policy-based approach where access is denied by default and must be explicitly permitted via policies, aligning with the Principle of Least Privilege.

Creating Policies

Database policy creation Screen

Initiating Policy Creation

  1. From Policies Section:

    • Navigate to "Policies" in the sidebar
    • Click "+ Add Policy"
  2. From Database Details:

    • When viewing database details
    • Click "Grant Access"
Database Agent Installation Screen Database Agent Installation Screen Database Agent Installation Screen

Policy Configuration Fields

Primary Information Tab

  1. Policy Type

    • Description: Category of resource the policy governs
    • Selection: "Database Policy"
    • Purpose: Ensures subsequent options are relevant to database security
  2. Select IAM Users (Policy Subject - "Who")

    • Description: IAM user(s) or group(s) to whom this policy applies
    • Action: Choose identities recognized by Authnul
    • Purpose: Links the policy to specific authenticated entities
  3. Select Host (Target Resource - "Where")

    • Description: Host machine with an Authnull Agent
    • Action: Select from list of hosts with active agents
    • Purpose: Narrows policy scope to databases managed by the agent
  4. Select Database (Target Resource - "What")

    • Description: Particular database instance on the selected host
    • Action: Select from dropdown of discovered instances
    • Purpose: Refines policy target to a single database
  5. Database User (Native Database Identity)

    • Description: Native database user account for ProxySQL connection
    • Action: Select from pre-configured users or type new mapping
    • Purpose: Abstracts IAM users from native database credentials
  6. Select Tables (Granular Target Resource)

    • Description: Specific tables/views within the database
    • Action: Multi-select dropdown or checklist
    • Purpose: Enforces Least Privilege
  7. Privilege (Permissions Granted)

    • Description: SQL operations permitted
    • Action: Select from READ, WRITE, EXECUTE, etc.
    • Purpose: Controls user interaction level with data
  8. Fields to mask (Data Masking Configuration)

    • Description: Columns to mask in query results
    • Action: Enter column names to mask for each table
    • Purpose: Protects sensitive data elements

Additional Policy Configuration Options

Policy Workflow

  • Multi-stage approvals
  • Notifications
  • Review processes

Time-Bound Access

  • Access restricted to specific days/hours
  • Temporary access grants
  • Scheduled access windows

Offline Access

  • Rules for agent disconnection
  • Cached policies
  • Fallback behavior

Location Access

  • Policies based on user's location
  • Geographic restrictions
  • IP-based access control

Network Access

  • Source IP address/range restrictions
  • Network-based policies
  • VPN requirements

User Behavioral Analytics

  • Integration with UBA
  • Risk-based access
  • Anomaly detection

Device Policies

  • Access conditional on device posture
  • Device compliance requirements
  • Endpoint security integration

Policy Approval Workflow

Importance of Administrative Approval

  1. Governance: Ensures alignment with security standards
  2. Preventing Misconfiguration: Safeguards against excessive privileges
  3. Separation of Duties: Check and balance
  4. Audit Trail: Approval/rejection is part of the policy lifecycle

Reviewing Pending Policies

  1. Navigation: Go to "Policies" section
  2. Policy List: Shows policies with "Status" (e.g., Pending)
  3. Review: Select pending policy to view full configuration

Policy Actions

  1. Approve:

    • Changes status to Active/Allowed
    • Policy propagates to agents
    • Takes effect immediately
  2. Reject:

    • Changes status to Rejected
    • Policy does not become active
    • Requires new submission
  3. Cancel:

    • Exits dialog without changing status
    • Policy remains pending