TroutTrout

Access Control Lists

Decide who gets to reach which asset with which protocol — by user, by group, and by role.

3 min read · Last updated 2026-04-22

An Access Control List (ACL) in Access Gate is the table that answers one question for every session: is this principal allowed to reach this asset over this protocol, right now? The table is editable per enclave, searchable across the whole deployment, and backed by your identity provider.

What an ACL Entry Looks Like

Each row ties five things together:

FieldExampleNotes
Principalalice@acme.com, group:ot-ops, asset AA user, a group from your IdP, or another asset
Assetplc-42.ot-cell-a, all assets in enclaveA specific asset or every asset in the enclave
Protocolrdp, ssh, https, anyThe protocols the session is allowed to use
Permissionallow, blockDefault is deny — only allow rules open a path
Advanced Configurationtls required, VPN allowed, Secured Remote Acces, Access AgreementSpecific configurations on top of Permission

ACLs for Users

Adding every user individually does not scale well. Access Gate supports ACLs bound to user groups synced from your IdP — Entra ID, Okta, or Microsoft 365.

Add a group-based ACL
  1. Sync your IdP groups first: see Synchronize user directory (Entra ID).
  2. Navigate to Enclaves → [Your Enclave] → Access Control.
  3. Click Add rule.
  4. For Principal, pick Group and choose the IdP group.
  5. Pick the asset(s) and protocol(s).
  6. Save.

Group membership is re-evaluated on each session — the user does not need to log in again for a membership change to take effect.

Add specific ACL for a user

But if you want to manage your access at the user level, that works too!

Default Deny

Access Gate is default-deny: a session is rejected unless a matching allow rule exists. There is no implicit "members of the enclave can do anything" — every protocol on every asset is an explicit grant.

This means first-time enclave setup feels strict on purpose. Plan on:

  1. Creating the enclave and adding members.
  2. Turning on traffic inspection to see what the members actually try to do.
  3. Translating observed flows into ACL rules.

The Quick start walks through this loop.

Changes Are Audited

Every ACL edit lands in the enclave's change history (see Viewing enclave change history) with the operator, timestamp, and before/after values. Changes to access-screen permissions are recorded the same way.