Side-by-side comparison
| RBAC | TBAC | |
|---|---|---|
| Access based on | Who the agent is (role/identity) | What the agent is doing (task/intent) |
| Permissions | Static, bundled in roles | Dynamic, scoped per task |
| Duration | Persistent (as long as role is assigned) | Time-limited (just-in-time, auto-expire) |
| Granularity | Coarse (role level) | Fine (task + context level) |
| Audit trail | ”Agent X has Support role" | "Agent X accessed Customer Y’s data for Ticket Z” |
| Best for | Human users, predictable workflows | AI agents, dynamic multi-step tasks |
Three scenarios
1. Support agent processing a refund
- RBAC approach
- TBAC approach
The AI agent has a “Support Agent” role with access to:
- All customer records
- All billing data
- All ticket management tools
2. CI/CD agent deploying to production
- RBAC approach
- TBAC approach
The CI/CD agent has a “Deploy” role with access to all environments — staging, production, DR.Problem: A misconfigured pipeline or prompt injection could trigger deployments to production when only staging was intended.
3. Data analyst querying customer database
- RBAC approach
- TBAC approach
The analyst agent has a “Data Analyst” role with read access to all databases.Problem: The agent can query any table, including PII-heavy tables unrelated to the current analysis. No way to scope queries to the specific dataset needed.
Why it matters for compliance
TBAC directly addresses regulatory requirements:- EU AI Act — requires “appropriate technical and organisational measures” for AI systems. TBAC provides granular, auditable access control.
- GDPR — requires data minimization and purpose limitation. TBAC ensures agents only access data needed for the specific task.
- SOC 2 — requires access controls and audit trails. TBAC provides both, with per-decision logging.
When to use TBAC
TBAC is most valuable when:- Agents perform varied tasks that need different tool/data access
- You need to prove compliance with per-action audit trails
- Agents access sensitive data that should be scoped to specific operations
- Multiple agents collaborate on workflows with different access needs
TBAC and RBAC aren’t mutually exclusive. Identity labels in Devctrl serve a similar role to RBAC — you can use them for coarse-grained access. TBAC adds the task dimension for fine-grained, dynamic control.
Next steps
Quickstart
Try TBAC end-to-end in 15 minutes.
Policy examples
Real-world CEL policy patterns.