Create Access Policies

Conditions préalables

 Les autorisations suivantes :

  • Authorization > policy > All Permissions
  • Authorization > policy > Add
  • Authorization > policy > Delete
  • Authorization > policy > View

The following organization setting:

You can create a new access policy from scratch by using the Create Policy option or use an available Genesys Cloud designed prebuilt policy template, edit it, and save it as a policy.

Create an access policy from a prebuilt template

To create an access policy from an existing policy template, do the following: 

  1. Cliquez sur Admin. 
  2. Under People & Permissions, click Access Policies.
  3. Click Templates.
  4. Select an existing template. Currently, Genesys Cloud provides the following access policy templates for you to get started:
  5. Click the policy template based on your requirement. The template details appear.
  6. Edit the policy name and description.
  7. Modify the domain, entity, and action fields if you’re specifying a different target for the policy.
  8. (Optional) Allow the policy to be enabled immediately by toggling the Enable Policy option. You can also enable a policy later by editing the policy. For more information, see Enable Access Policy
  9. Modify the subject, effect, and condition sections in the Policy JSON, if necessary, to meet your organizational needs.
    Remarque : 
  10. To validate the JSON syntax, click Validate Syntax in the Validate Syntax tab. Resolve any syntactical errors, and proceed with saving the policy. In case you don’t validate syntax explicitly, Genesys Cloud automatically validates syntax when you save the policy. The syntax validation step validates the following: 
    • Whether the mandatory fields are available.
    • The listed attributes are valid for the specified target.
    • All attribute comparisons are valid for their respective data types.
    • Any preset attribute names don’t conflict with the ones defined in the system.
  11. Click Save as Policy
  12. To verify if the policy works as expected, click the Test Policy tab and provide sample data and click Test Policy.
  13. To go back to the policies page, click Cancel.

Sample prebuilt templates

Currently, Genesys Cloud includes the following access policy templates:

This policy template is designed to prevent non-admin users from granting roles they do not themselves have.

You can modify template parameters in the Policy JSON: the domain, entity, and action fields specify the target, or group of API calls.

ABAC Policy editor depicting Cannot Grant New Roles template

This template has the following two conditions:

Condition 1

"subject.role.names": {
"contains_one": "admin.role.names"
}

This condition checks whether the subject has an admin role. If the subject has an admin role, the result is Allow.

Condition 2

"subject.role.names": {
"contains_one": "authorization.grant.role.name"
}

If the subject does not have an admin role, the action is allowed only if the subject already has the role that they are trying to grant. authorization.grant.role.name is an attribute, which contains the name of the role that the subject is trying to grant to either themselves or another user. So, for example, if the subject has a supervisor role but not an admin role, the result is Deny, if they attempt to grant an admin role. In this scenario, the admin role is not contained in the list of subject role names.

In this template, the preset attributes for admin.role.names can be a list containing the admin and masterAdmin roles. If you have other custom admin roles in your organization, you can add them to this list, separated by commas.

This policy template is designed to prevent defined user profile fields from being modified, except by supervisors or admins. 

Note: This template contains attributes for all the fields displayed in the User Profile page. You cannot restrict a user from updating the fields that are not included in the User Profile page via an access policy, for example, WebRTC settings is not part of the User Profile page.

ABAC Policy editor depicting Cannot Grant New Roles template

This template contains an Any rule, which means that the policy returns a result of Allow if any of the specified conditions are met. The template has the following two conditions by default. 

Condition 1

"profile.fields": {
"contains_none_ignore_case": "restricted.fields.value"

This condition checks if the user profile field being modified is not included in the restricted.fields.value preset attributes list and ignores case sensitivity in the comparison. If the field being modified is not on the list, then the result of this condition is True. You can edit the preset attributes list either as individual fields or as a section name or a combination of both, according to the needs of your environment. For more information about supported preset attributes, see restricted fields value list

Condition 2

"subject.role.names": {
"contains_one": "manager.role.names"

This condition checks whether the subject has a role that is included on the preset attributes list of manager.role.names. If the subject has any one of these roles, then the action is allowed.

Once the template has been saved as a policy, you can test the policy to confirm it works as expected. In the following example image, the subject has the admin role so the request is allowed, even though the profile field (agent.name) is included in the list of restricted fields.

Shows example data for the Cannot update certain user fields template

Create an access policy using the Create Policy feature

To create an access policy from scratch, do the following:

  1. Cliquez sur Admin. 
  2. Under People & Permissions, click Access Policies.
  3. Click Create Policy.
  4. Enter the policy name and description.
  5. Specify the domain, entity, and action fields based on your policy requirements. You can refer the prebuilt templates for creating your own policy. 
  6. (Optional) Allow the policy to be enabled immediately by toggling the Enable Policy option. You can enable a policy later by editing the policy. For more information, see Enable Access Policy
  7. Define the subject, effect, and condition sections in the Policy JSON based on your organizational needs.
    Remarque : 
  8. To validate the JSON syntax, click Validate Syntax in the Validate Syntax tab. Resolve any syntactical errors, and proceed with saving the policy. In case you don’t validate syntax explicitly, Genesys Cloud automatically validates syntax when you save the policy. The syntax validation step validates the following:
    • Whether the mandatory fields are available.
    • The listed attributes are valid for the specified target.
    • All attribute comparisons are valid for their respective data types.
    • Any preset attribute names don’t conflict with ones defined in the system.
  9. Cliquez sur Sauvegarder.  
  10. To verify if the policy works as expected, click the Test Policy tab and provide sample data and click Test Policy.
  11. To go back to the policies page, click Cancel.

  • Si vous avez encore des questions, vous pouvez demander l'aide de la communauté à l'adresse .
  • Ce champ sert à des fins de validation et ne doit pas être modifié.