user
09/16/2021, 5:33 AMsudoer
09/16/2021, 5:34 AMuser
09/16/2021, 5:35 AMsudoer
09/16/2021, 5:39 AMuser
09/16/2021, 5:43 AMsteven
09/17/2021, 8:27 AMJoey
09/17/2021, 2:37 PMreader
and writer
) on a resource such as a document
, you'd do:
definition user {}
definition resource {
relation reader: user
relation writer: user
permission view = reader + writer
}
here, the permission to view
a document is defined as any users that are either reader
or writer
(or both), which form the roles you wantsteven
09/17/2021, 4:39 PMblah
role with write access to a s3 bucket, access to view a webpage, ability to login prod servers etc.
but that would definitely put too much burden on iam engineers who review those requests: 1. each team may want to create a role for each of their use cases (oncall role, normal role, prod role etc.) 2. iam engineers don't have the context of everything, imagine thousands of resources and each of them is domain specific.
how do you envision the process for users to create roles while following the least privilege principle, in a scalable way?Joey
09/17/2021, 5:16 PMJoey
09/17/2021, 5:17 PMuser
09/17/2021, 5:19 PMuser
09/17/2021, 5:24 PMuser
09/17/2021, 5:25 PMRocio
09/21/2021, 6:34 PMdef write_content(user, content_id, new_content):
is_allowed, zookie = content_change_check(content_id, user)
if is_allowed:
storage.write_content(contentd_id, new_content, zookie)
return success
return forbidden
But how would I retrieve the zookie for a new document if I don't yet have the content_id
? And how would I know if the user has access to write the content? Would I check if the user has access to the folder/account?user
09/21/2021, 6:43 PMuser
09/21/2021, 6:43 PMuser
09/21/2021, 6:44 PMRocio
09/21/2021, 6:50 PMuser
09/21/2021, 6:52 PMuser
09/21/2021, 6:53 PMdot
09/28/2021, 8:02 PMJoey
09/28/2021, 9:55 PMJoey
09/28/2021, 9:56 PMJake
09/28/2021, 10:04 PMJoey
09/30/2021, 3:10 PMmetalmatze
09/30/2021, 3:13 PMRocio
09/30/2021, 4:02 PMmetron
09/30/2021, 4:25 PMuser
09/30/2021, 5:28 PMJake
09/30/2021, 5:40 PM