Skip to main content

Creating PBAC Membership Policies

Manual group and role assignments create administrative overhead and risk outdated permissions as people change departments, join projects, or transfer locations. PBAC Membership Policies automate these assignments by evaluating user attributes in real-time, ensuring that access remains current without manual intervention.

PBAC Membership Policies define the conditions under which actors (such as people or Business Roles and Locations) are added to roles, groups, or collections. These policies use attribute-based rules to dynamically assign membership based on Field Types and their values.

Policy Workflow

Creating a PBAC Membership Policy is a two-step process: first create the policy (this article), then add attribute conditions that define which actors qualify for membership. For conceptual background, see Overview of PBAC Membership Policies.

This article demonstrates how to create a PBAC Membership Policy using the Role Modeling Inbox.

Prerequisites

Before creating PBAC Membership Policies, ensure you have:

  • Administrative access to EmpowerID
  • PBAC Field Types already created with appropriate values
  • A target group, role, or collection to which the policy will assign members

Understanding Policy Types

PBAC Membership Policies support four membership types that determine how the system handles matching actors:

Policy TypeBehavior
MemberGrants membership automatically if Auto-Approve is enabled; otherwise generates Business Requests for approval
EligibleMarks matching actors as eligible; they can request membership through the IAM Shop
Pre-ApprovedAutomatically adds matching actors as members without additional approval
SuggestedDisplays membership as a suggestion in the IAM Shop for matching actors

Choose the policy type based on your organization's approval requirements and risk tolerance for the target membership.

Procedure

  1. Sign in to EmpowerID as an administrator.

  2. Navigate to Role Management > Role Modeling Inbox.

  3. Open the Attribute-Based Membership Policies tab and click the Add New button. Add New button on Attribute-Based Membership Policies tab The Attribute-Based Membership Policy form opens. Attribute-Based Membership Policy form

  4. Under the Assignment Information section, configure the policy target:

    • Which Type of Assignee for this Policy?: Select the target type from the dropdown:

      • Business Role and Location
      • Management Role
      • Management Role Definition
      • Group
      • Query-Based Collection
    • After selecting the type, choose the specific target. For example, if you select Management Role, choose a specific role like "Docs-SA." If you select Group, choose the specific group. Assignment Information section

  5. Complete the policy details under the Other Info section:

    FieldDescriptionAction
    NameUnique internal name for the policyEnter a name without spaces.
    Display NameUser-friendly name shown in EmpowerIDEnter a display name.
    Policy TypeDetermines how matches are processedSelect Member, Eligible, Pre-Approved, or Suggested (see table above).
    Is EnabledControls whether the policy is activeEnable to activate the policy. When disabled, the policy generates reviewable proposals without applying them.
    Auto-ApproveDetermines if matches are automatically approvedEnable for automatic approval; disable to generate Business Requests requiring manual approval.
    Job Schedule IntervalDefines when the policy runsSpecify start/end dates and execution interval. Default is once every 24 hours.
  6. Click Save to create the policy.

    The newly created policy appears in the Attribute-Based Membership Policies grid. Policy in grid after creation

Verify the Results

After creating the policy:

  1. Navigate to Role Management > Role Modeling Inbox > Attribute-Based Membership Policies tab.
  2. Search for your newly created policy by name or display name.
  3. Verify that the policy appears in the grid with the correct target type and policy type.
  4. Click the policy link to confirm all configuration details are accurate.
Policy Incomplete

The policy you just created will not assign any members until you add attribute conditions that define which actors qualify for membership. Continue to the next step to complete the policy configuration.

Next Steps

Your PBAC Membership Policy is created but not yet functional. To complete the configuration:

  1. Add Attribute Conditions - Define which Field Types and values actors must have to qualify for membership
  2. Assign PBAC Attributes to users - Ensure actors have the attributes the policy will evaluate
  3. Monitor policy execution - The policy will run according to the configured Job Schedule Interval to evaluate and assign memberships