A comprehensive overview of access control models from foundational DAC/MAC to modern RBAC, ReBAC, and ABAC. Covers how each model works, their tradeoffs (role explosion, schema complexity, attribute sprawl), and when to use them. Explains how PBAC and identity orchestration coordinate multiple models. Includes a dedicated section on AI agent access control challenges, noting that traditional static credentials fail for autonomous agents and that FGA with ephemeral, scoped credentials is the emerging solution. Concludes with practical guidance on choosing the right combination of models based on organizational needs.
Table of contents
How access control began (and evolved)Role-based access control (RBAC)Fine-grained access control (FGA)Orchestrating access across different modelsAccess control for AI agentsWhen to use each access control modelImplementing access control that fits your needsSort: