Skip to content

Amazon Verified Permissions

The Amazon Verified Permissions (AVP) connector enables you to deploy your Big ACL authorization rules directly to AWS for runtime enforcement.

This integration allows you to manage policies in Big ACL while leveraging Amazon’s highly available and scalable authorization service.

Amazon Verified Permissions is a managed authorization service from AWS that uses the Cedar policy language.

Big ACL automatically translates your rules into Cedar policies and synchronizes them with your AVP Policy Store.

Big ACL ComponentAVP Equivalent
Entity Types (Schema)Cedar Schema
Authorization RulesCedar Policies
GroupsEntity hierarchies

Before configuring the connector, ensure you have:

  1. An AWS account with Amazon Verified Permissions enabled
  2. A Policy Store created in AVP (you’ll need the Policy Store ID)
  3. IAM credentials with appropriate permissions to access AVP

The IAM role or access key used by Big ACL must have the following permissions on your Policy Store:

PermissionPurpose
verifiedpermissions:GetPolicyStoreRead Policy Store configuration
verifiedpermissions:GetSchemaRead the current schema
verifiedpermissions:PutSchemaUpdate the schema with entity types
verifiedpermissions:ListPoliciesList existing policies
verifiedpermissions:CreatePolicyCreate new policies
verifiedpermissions:UpdatePolicyUpdate existing policies
verifiedpermissions:DeletePolicyRemove obsolete policies

  1. Navigate to Settings > Connectors in the Big ACL console
  2. Select Amazon Verified Permissions
FieldDescription
Policy Store IDThe unique identifier of your AVP Policy Store (format: ps-xxxxxxxx)
AWS RegionThe region where your Policy Store is hosted

Choose one of two authentication methods:

Use an IAM user’s access key for authentication. Recommended for development and testing.

FieldDescription
Access Key IDYour IAM access key ID (format: AKIA...)
Secret Access KeyYour IAM secret access key

Assume an IAM role for authentication. Recommended for production environments.

FieldDescription
Role ARNThe full ARN of the IAM role to assume

The IAM role option provides better security through temporary credentials and cross-account access capabilities.

Click Test Connection to verify that Big ACL can successfully connect to your Policy Store. A successful test confirms:

  • The credentials are valid
  • The Policy Store exists and is accessible
  • The required permissions are in place

Click Save to store your configuration. The connector is now ready to synchronize.


When you synchronize:

  1. Schema Export: Big ACL exports your entity types as a Cedar schema
  2. Policy Translation: Each enforced rule is translated into Cedar policy syntax
  3. Deployment: Policies are created, updated, or deleted in AVP to match Big ACL

Only rules with Enforced status are synchronized. Draft and Archived rules are not deployed.

Enable automatic synchronization to deploy changes as soon as rules are validated:

  1. Toggle Automatic synchronization to On
  2. Changes are synced immediately when a rule reaches Enforced status

This ensures your AVP Policy Store always reflects your current authorization policies.

If automatic sync is disabled, you can trigger synchronization manually:

  1. Click the Sync Now button
  2. Monitor the sync status until completion
  3. Review any errors if the sync fails

Manual mode is useful when you want to batch changes or review policies before deployment.

The connector displays the current synchronization status:

StatusDescription
Not syncedNo synchronization has been performed yet
Syncing…Synchronization is in progress
SuccessLast synchronization completed successfully
FailedLast synchronization encountered an error

The connector continuously monitors the connection to AVP:

StatusDescription
ConnectedBig ACL can reach the Policy Store
DisconnectedConnection is not established
ErrorConnection failed (hover for details)

The dashboard displays key metrics:

MetricDescription
Rules SynchronizedNumber of policies deployed to AVP
Entity TypesNumber of schema types in the Policy Store
Last Successful SyncTimestamp of the last successful synchronization

Big ACL translates your natural language rules into Cedar policies. You can preview the Cedar syntax for any rule in the rule details view.

Big ACL Rule:

“A developer can access a repository if they belong to the same team as the repository owner.”

Cedar Policy:

permit(
principal is Developer,
action in [Action::"access"],
resource is Repository
)
when {
principal.team == resource.owner.team
};

The Cedar preview allows you to verify the translation before deployment.


“Access Denied” error

  • Verify your IAM credentials are correct
  • Ensure the IAM user or role has the required permissions
  • Check that the Policy Store ID matches your target store

“Policy Store not found” error

  • Confirm the Policy Store ID is correct
  • Verify you’re using the correct AWS region

“Credentials expired” error

  • For access keys: generate new credentials in AWS IAM
  • For IAM roles: ensure the trust policy allows Big ACL to assume the role

“Schema validation failed”

  • Review your entity types for circular references
  • Ensure all referenced entity types exist
  • Check for invalid attribute names

“Policy limit exceeded”

  • AVP has limits on the number of policies per store
  • Consider consolidating rules or using a separate Policy Store
  • Contact AWS support to request a limit increase

“Conflicting policies”

  • Review the failed policies in the sync error message
  • Check for duplicate rule IDs or conflicting definitions

  • Use IAM roles instead of access keys for production deployments
  • Apply least privilege: only grant the permissions listed above
  • Enable CloudTrail to audit AVP API calls
  • Rotate credentials regularly if using access keys
  • Enable automatic sync to ensure policies are always current
  • Monitor sync status and set up alerts for failures
  • Test in a non-production Policy Store before deploying to production
  • Use separate Policy Stores for different environments (dev, staging, prod)
  • Establish naming conventions for easy identification of Big ACL policies
  • Document your sync schedule if using manual synchronization

The connector supports all AWS regions where Amazon Verified Permissions is available: