Goal: Create, version, activate, and test policies in the dashboard.
Policies define who can do what on drive objects (files and folders). Some policies also govern bridge behavior (for example, sharing a transfer by email). This guide covers the dashboard lifecycle. For the policy document structure (YAML/JSON, statements, subjects, actions), see Writing policies.
For how bridge policy differs from Drive object policy, see Bridge transfers and Drive access control.
Prerequisites
- Access to the dashboard with permission to manage policies (organization or partner catalog). Typically an admin or PolicyAdmin (see RBAC).
List policies
- Open Policies in the dashboard.
- Use filters to narrow the list: partner (per counterparty), or Organization for policies stored in the organization catalog (no partner row).
- Use the list to open a policy, create a new one, or manage versions.
Bridge default (system-managed)
The bridge default is a single AccessPolicy per organization that
holds the rules for bridge actions such as TRANSFER_SHARE. The
storage anchor differs by whether the org has any partners:
- Organization has at least one partner — The policy document is stored under a partner catalog (low partner id used as anchor); the same bridge rules apply org-wide via ORG attachments.
- Organization has no partners — The policy is stored in the organization catalog (no partner FK). Bridge evaluation is unchanged: ORG attachments still apply the default to every identity in the org.
In the Policies list it appears as Stellarbridge bridge (default) (or similar) and may show a Bridge default badge. The row is marked system-managed: you cannot delete it from the API or UI.
How it relates to organizations
- Each organization gets an organization-scoped (ORG) attachment to this policy so bridge checks apply to every identity in the org, without a separate Settings toggle.
- The platform runs an ensure step when you create a partner, when a bridge flow needs the policy, or when the org has no partners (org-catalog seed).
What the first version contains
- The seeded version 1 is a permissive default:
TRANSFER_SHAREis ALLOW for UPN, API, and AGENT identities (see Bridge actions). - The document uses
scope: IDENTITYon the AccessPolicy row, which matches how bridge evaluation merges ORG and identity attachments.
How evaluation combines rules
- For bridge actions, the engine evaluates policies in order: all ORG attachments for the organization first (including this default), then policies attached directly to the identity. DENY still wins over ALLOW; if nothing matches, the action is denied.
How you change behavior
- You cannot delete the policy. Tighten or relax rules by new versions (fork → edit → activate), like any other policy.
- Add identity-scoped attachments for per-user overrides (see Writing policies).
Create a policy
- In Policies, choose Create policy (or equivalent).
- Choose the catalog: Organization (no partner) for an organization-catalog policy, or select a partner for a partner-catalog policy. You cannot mix both on one policy row.
- Add a version: paste or upload a policy document (YAML or JSON) that follows the OBJECT scope structure.
- Save. The new version is not active until you activate it.
Drive (OBJECT) attachments: Org-catalog policies can be attached to objects in organization-only projects (projects with no partners, tied to the org). Partner-catalog policies attach to objects in projects that include that partner. You cannot attach a partner-catalog policy to an org-only project, or an org-catalog policy to a partner-scoped project, when the org/partner does not match.
Versions and activate
- Each policy can have multiple versions. Only one version is active at a time; the active version is what the policy engine uses.
- To add a new version: open the policy, add a version, and provide the new document.
- To activate a version: open the policy, select the version you want, and choose Activate. The previous active version is replaced.
- Test changes in a non-active version first; use Policy evaluate (below) to simulate scenarios before activating.
Export and import
- Export: From the policy or version view, choose Export to download the policy document (e.g. for backup or review).
- Import: Use Import to create or replace a version from a file (YAML or JSON). Validate the document structure; then activate if appropriate.
Policy evaluate (test scenario)
Policy evaluate lets you simulate “Can this identity perform this action on this object?” without performing the action.
- Open Policies and choose Policy evaluate (or open it from a policy/object context).
- Select or enter the object (e.g. folder or file), identity
(user, API key, or agent), and action (e.g.
DRIVE_DOWNLOAD,DRIVE_SEND, or bridgeTRANSFER_SHARE). - Run the evaluation. The result shows whether the request would be allowed or denied and which statements matched.
Use this to verify policy behavior before activating a new version or attaching a policy to an object.
See also
- Writing policies — Policy document structure, subjects, actions, effects, and examples
- Bridge transfers and Drive access control — Bridge policy vs Drive object policy
- Using the Drive — Attach policies to objects, run evaluate from the object
- RBAC — Route-level access (policies apply after RBAC)