Access Control

Define fine-grained policies that control who can access which resources, under what conditions.

Access Control Model

Remok uses Role-Based Access Control (RBAC) with optional conditions. Every access decision is determined by three factors:

  • Identity β€” who is requesting access (user or group)
  • Resource β€” which application or network resource is being accessed
  • Conditions β€” time of day, IP range, device type, and more

Creating a Policy

Navigate to Admin Console β†’ Security β†’ Access Policies β†’ Add Rule:

# Example: Engineering can access GitLab during business hours
Rule Name:     Engineering-GitLab-Access
Apply To:      Group: Engineering
Target:        Application: GitLab
Time Window:   Mon–Fri, 09:00–21:00
Device:        Corporate devices only
Action:        Allow

Available Condition Types

ConditionDescriptionEdition
Time RangeAllow access only within a specified time windowPro
IP AllowlistRestrict access to specific IP addresses or subnetsPro
Device TypeLimit to corporate-managed devicesEnterprise
Geographic RegionRestrict by country or regionEnterprise
πŸ’‘ Conditions can be combined. Rules are evaluated in priority order β€” the first matching rule is applied and evaluation stops.

Least-Privilege Design

Best practices for access policy design:

  • Default-deny: start with no access, then explicitly grant per application
  • Use groups rather than individual users for easier maintenance
  • Review and prune stale rules quarterly
  • Use time-limited rules for contractors and temporary access

Contractor and Time-Limited Access

For external vendors, create a temporary access rule:

Rule Name:     Vendor-Portal-Temp
Apply To:      Group: External-Contractors
Target:        Application: Vendor Portal
Valid Until:   2026-06-30
Action:        Allow
⚠️ Always set an expiry date for contractor access. Revoke group membership immediately when the engagement ends.

Viewing and Auditing Rules

All policy changes are recorded in the Audit Logs. To review effective access:

  1. Go to Admin Console β†’ Security β†’ Access Policies
  2. Use the "Simulate" button to test what a specific user can access
  3. Export the policy list as CSV for compliance review