Policy Evaluation Flow Diagram
This diagram shows the complete flow of how Alien Giraffe evaluates access requests, from initial authentication through policy matching, fallback evaluation, approval workflows, and final decision.
Complete Evaluation Flow
Section titled “Complete Evaluation Flow”Loading diagram...
Flow Explanation
Section titled “Flow Explanation”Primary Path (Policy Match)
Section titled “Primary Path (Policy Match)”- User Access Request → User initiates request for data access
- Authentication → Verify user identity via SSO/IAM
- Gather Context → Collect request details (user, resource, time, purpose, duration)
- Search Matching Policies → Find policies that match the request criteria
- Evaluate Policy Conditions → Check constraints, timeframes, and restrictions
- Approval Required? → Determine if human approval is needed
- Grant Access → Issue temporary credentials
Fallback Path (No Policy Match)
Section titled “Fallback Path (No Policy Match)”- Check Fallback Policies → Search for applicable fallback (resource → namespace → global)
- Evaluate Fallback → Check if fallback allows this request
- Fallback Requires Approval? → Determine if fallback has human-in-the-loop approval
- Request Approval → Route to appropriate approvers if required
- Grant Access or Deny → Based on fallback and approval outcome
Approval Workflow
Section titled “Approval Workflow”When approval is required (for either policies or fallbacks):
- Identify Approvers - Manager, data owner, security team, or custom roles
- Send Notification - Email, Slack, or portal notification
- Wait for Decision - With configurable timeout
- Escalate if Needed - After timeout threshold
- Apply Decision - Grant if approved, deny if rejected or timed out
Denial Points
Section titled “Denial Points”Access can be denied at multiple stages:
- Authentication Failed - User identity cannot be verified
- Policy Condition Failed - Policy exists but conditions not met (wrong time, wrong context, etc.)
- No Policy Match - No policy or fallback covers this request
- Approval Denied - Human approver rejects the request
- Approval Timeout - No approval received within timeout period
Audit Logging
Section titled “Audit Logging”Every request is logged regardless of outcome:
- Granted: Policy/fallback used, approval flow (if any), credentials issued
- Denied: Denial reason, which stage failed, policies evaluated
Related Documentation
Section titled “Related Documentation”- Policy Evaluation & Fallback Handling - Full guide on policy evaluation
- Constraints - JIT access and approval workflows
- Monitoring & Auditing - View policy evaluation logs