Role-based Access Controls
Manage user and machine identitity permissions through predefined roles.
Additional Privileges
Add specific privileges to users and machines on top of their roles.
Temporary Access
Grant timed access to roles and specific privileges.
Access Requests
Enable users to request (temporary) access to sensitive resources.
Approval Workflows
Set up review policies for secret changes in sensitive environments.
Audit Logs
Track every action performed by user and machine identities in Infisical.