- Authorization Control Plane
- Open Banking
-
Features
- OAuth
- Workspaces
- Tenants
- Data Lineage
- Policies
- Services
- User portals
- Secrets management
- Privacy
- BYOID
- Access Control for Devices
- IDP discovery
- Authorization for GraphQL
- Dynamic scopes
- Extensions
- Stateful authZ
- Standalone Authorizer
- AuthZ for Istio
- AuthZ for Kong
- Keys management
- Search and filters
- Multi-tenant authorizers
- Transactional MFA
- Audit events
-
Guides
- Quick start
- Workspace administrator
-
Developer
- Encryption
- mTLS client
- DCR
- API security
- Extensions
-
Open Banking
- Custom consent for OB UK
- CDR Arrangement Amendment
- CDR Consumer Consent Withdrawal
- CDR ADR Client Management
- CDR DH API protection
- Implementing OB Brazil consent pages
- CDR consent app
- CDR consumer dashboards
- Enabling custom consent
- Integrating custom consent
- OB DCR
- Setting AMR and ACR claims
- Use reference consent self-service and admin portals
- APIs
- External services APIs
Access control
Creating a policy in the ACP policy editor
Instructions on how to create a policy to verify requests based on your access control requirements using the Authorization Control Plane policy editor.
Creating policies for MFA enforcement
Learn how to create a policy enforcing multi-factor authentication (MFA) in Authorization Control Plane (ACP) in order to assign it as an additional protection layer for user authentication and grant assignments.
Restricting scope granters
Instructions for restricting who can assign a scope
Restricting scope requestors
Instructions for restricting who can request a scope
Verifying a policy
Instructions on how to test your policy in a sample application