Resmo Documentation
SupportStatuspageTwitterLinkedIn
  • Welcome!
  • Getting Started
    • Quick Start Guide for Admins
    • SaaS Security Guide for Employees
    • Glossary
    • FAQ
    • Support
    • Resources documentation (automated)
  • Guides
    • Query Your First Resources
    • Create Your First Rule
  • Resources
    • Resources
    • Resource Changes
  • Notebooks
    • Notebooks
  • Audit Logs
    • Audit Logs
  • API
    • Basics
    • Query API
  • Resource Tags
    • Tag Rules
    • Manual Tagging
  • Queries
    • Query Types
    • Standard SQL Queries
    • Change SQL Queries
  • SaaS Discovery
    • SaaS Discovery Methods
    • Browser Extension Admin Guide
    • AI Email Scanning
    • Resmo Agent (Beta)
    • Apps Page
    • Users Page
  • Rules
    • Rules
    • Suppression
    • AWS Config Rules vs Resmo Rules
  • Dashboards
    • Dashboards
  • Packs (Compliance and Security Best Practices)
    • Packs
    • Pack Exports
  • Alerts
    • Alerts
  • Variables
    • Variables
  • integrations
    • Integrations Guide
    • Custom Data Integration
    • AWS Integration
    • Azure Integration
    • GCP Integration
    • Google Drive Integration
    • Kubernetes Integration
    • Google Workspace Integration
    • GitHub Integration
    • Slack Integration
    • GitLab Integration
    • New Relic Integration
    • Jira Integration
    • PagerDuty Integration
    • Opsgenie Integration
    • MongoDB Atlas Integration
    • Azure Active Directory Integration
    • Cloudflare Integration
    • Confluence Integration
    • Bitbucket Integration
    • Okta Integration
    • Datadog Integration
    • Gandi Integration
    • Snyk Integration
    • Duo Integration
    • Jamf Integration
    • Snowflake Integration
    • Heroku Integration
    • Fastly Integration
    • Hubspot Integration
    • BambooHR Integration
    • Azure DevOps Integration
    • Kolide Integration
    • Flyio Integration
    • Upstash Integration
    • Qualys Integration
    • Sentry Integration
    • Brex Integration
    • JumpCloud Integration
    • Webflow Integration
    • Tenable Integration
    • SonarCloud Integration
    • Salesforce Integration
    • LastPass Integration
    • Microsoft Teams Integration
    • Zendesk Integration
    • Segment Integration
    • Terraform Cloud Integration
    • Tailscale Integration
    • Vercel Integration
    • GoDaddy Integration
    • Kandji Integration
    • LaunchDarkly Integration
    • PlanetScale Integration
    • Zoom Integration
    • Jotform Integration
    • Auth0 Integration
    • Wizer Integration
    • Linear Integration
    • Figma Integration
    • Trello Integration
    • Mixpanel Integration
    • Trivy Integration
    • CSV Integration
    • DocuSign Integration
    • Tinybird Integration
    • MonoSign Integration
    • DigitalOcean Integration
    • Sophos Integration
    • Firebase Integration
    • MySQL Integration
    • PostgreSQL Integration
    • MongoDB Integration
    • ClickHouse Integration
    • Help Scout Integration
    • Intercom Integration
    • Atlassian Integration
    • Drata Integration
    • Hetzner Cloud Integration
    • Vanta Integration
    • Microsoft Intune Integration
    • Microsoft Defender Integration
    • Microsoft 365 Integration
    • NPM Integration
    • CrowdStrike Integration
    • 1Password Integration
    • Lucid Integration
    • OneDrive Integration
    • JetBrains Integration
    • Google Analytics Integration
    • Hexnode Integration
    • SendGrid Integration
    • WordPress Integration
  • Notifications
    • Notification Channels
    • Email Notification Channel
    • Slack Notification Channel
    • Webhook Notification Channel
    • Opsgenie Notification Channel
    • PagerDuty Notification Channel
    • Amazon SNS Notification Channel
    • Parny Notification Channel
    • Linear Notification Channel
    • Jira Notification Channel
    • Microsoft Teams Notification Channel
  • Plugins
    • Raycast
  • Users and Permissions
    • User
    • User Roles
    • RBAC (Role-Based Access Control)
      • Custom Roles and Policies
    • SSO - Social Login
  • Settings
    • Accounts
    • Billing Policy
    • Pricing
      • Resource Count Calculation
Powered by GitBook
On this page
  • Policies
  • Statements
  • Examples of policy syntax
  • How to create a custom policy
  • Roles
  • Examples of role syntax
  • How to create a custom role
  • Support

Was this helpful?

  1. Users and Permissions
  2. RBAC (Role-Based Access Control)

Custom Roles and Policies

Policies

You manage access in Resmo by creating policies and attaching them to Roles. A policy is a group of access/deny statements that, when associated with a role, defines their permissions. Permissions in the policies determine whether the request is allowed or denied.

Statements

A statement is a container for permissions. A policy may contain up to 10 statements. You can define allow or deny statements inside the same policy. A statement consists of the following elements:

  • Actions: An action is an identifier for the method of the service.

  • Effect: Use Allow or Deny to indicate whether the policy allows or denies access.

  • Types: Some actions may require a type to restrict access granularly. It can be one or more than one of the following types:

    • Resource: It indicates whether the policy allows or denies specified resource types. This type starts with resource: prefix.

    • Integration: It indicates whether the policy allows or denies specified integration types. This type starts with integration: prefix.

    • Notification Channel: It indicates whether the policy allows or denies specified notification channel types. This type starts with channel: prefix.

Examples of policy syntax

The following policy allows access to AWS resources for query execution.

[
  {
    "actions": [
      "query:execute"
    ],
    "effect": "Allow",
    "types": [
      "resource:aws*"
    ]
  }
]

The following policy denies access to some of the sensitive resources for all actions.

[
  {
    "actions": [
      "*"
    ],
    "effect": "Deny",
    "types": [
      "resource:bamboohr_company_file",
      "resource:bamboohr_employee",
      "resource:bamboohr_user",
      "resource:brex_company",
      "resource:brex_user",
      "resource:cloudflare_user",
      "resource:device"
    ]
  }
]

How to create a custom policy

You can create custom roles and policies with the enterprise plan, but accessing these features can be requested.

How to create a custom policy using a policy builder

  1. Log in to your Resmo account.

  2. Click Settings from the navigation bar and then, Policies.

  3. Give a name to your custom policy.

  4. Select Allow or Deny from the Effect section.

  5. Select one or more services from the Services dropdown. This selection will fill the actions dropdown.

  6. Select one or more actions from the Actions dropdown.

  7. You need to select allowed/denied types from the Types dropdown If you select type-dependent action. If you select an action without type dependency, you must give * or *:* as type.

    1. An action with type dependency

    2. An action without type dependency

  8. Click the Create button.

How to create a custom policy from JSON

  1. Log in to your Resmo account.

  2. Click Settings from the navigation bar and then, Policies.

  3. Give a name to your custom policy.

  4. Open Advanced Mode.

  5. Click the Create button.

Roles

A role is a container for the policies. A role may contain up to 10 policies. You can use roles to delegate access to users. You can group custom or managed policies to define user access levels.

Examples of role syntax

The following role gives the user read-only access to the not restricted resources inside the sensitive-data-deny policy.

{
  "policies": [
    "readonly-access",
    "sensitive-data-deny"
  ]
}

How to create a custom role

You can create custom roles and policies with the enterprise plan, but accessing these features can be requested.

  1. Log in to your Resmo account.

  2. Click Settings from the navigation bar and then Roles.

  3. Give a name to your custom policy.

  4. Select one or more policies from the Policies dropdown. You can select max 10 policies for a role.

  5. Click the Create button.

Support

Contact our team via live chat or email us at contact@resmo.com for further queries and support requests regarding Roles and Policies.

PreviousRBAC (Role-Based Access Control)NextSSO - Social Login

Last updated 2 years ago

Was this helpful?

Create your statements with JSON syntax. You can take a look at JSON policy JSON syntax from . Take a look at all services and actions from .

here
here