Building Your Access Policy

Objective

After completing this lesson, you will be able to create a tailored access policy based on organization types, personas, and required access restrictions.

Create an Access Policy by Defining Policies and Specifying Related Assets

Introduction to the Authorization Model
Before you can build an authorization model, it’s critical to understand its foundation. Policies in SAP Customer Data Cloud for B2B allow you to manage and delineate who can access specific assets and what actions they can perform. Let’s dive into how you can establish a robust authorization model.
Elements of Policy-Based Access Control
​A Policy is driven by four main elements:
  • Assets/Asset Types, Actions, and Applications
  • Organization Availability
  • Automated Assignments
  • Conditions
Understanding Your Authorization Model
To define your authorization model, ask yourself these questions:
  • Which applications will use SAP Customer Data Cloud B2B for authentication and authorization?

    Typically, each application is created in SAP Customer Data Cloud B2B

  • What information does each application need to make an authorization decision?

    For example, groups like ‘b2badmingroup’, ‘b2bcustomergroup’, or ‘b2bmanagergroup’ need to be defined as assets for integration with SAP Commerce Cloud

  • How will you control organization members’ access?

    Use Automated Assignments to provide specific access to members of organizations

  • Are some assets available only under specific conditions such as date & time, IP address, etc.?

    Use Conditions and Asset Type Rulesets to restrict access under those specific scenarios

Creating an Access Policy

​In the following video, we'll guide you through the process of creating a tailored access policy. Specifically, we'll be demonstrating how to create an authorization model by defining policies and specifying the assets they relate to. By the end of this video, you'll have a clear understanding of how to implement fine-grained access control for your organization, enhancing security and compliance.

Log in to track your progress & complete quizzes