Ooo I didn't know it had that functionality! I wil...
# spicedb
o
Ooo I didn't know it had that functionality! I will expand my use case: Our services will be deployed into multiple customer environments, and we need to control both user access to those services, as well as limit communication between services across customer environments. We will have a central spicedb replica set in our own k8s cluster which each service from each customer environment will make permission check calls to - therefore, I would prefer those services to have read only access to the spicedb instance. Does that mean that multiple preshared keys + key rotation is not enough for my use case?
j
ah, I see. you basically want scoped access, where each token/key can access only a subset of the schema and perform a subset of operations (read only, etc)?
o
I had to think it through some more, but yes! In fact, some services should be able to create/delete relations for specific schema objects
j
yeah, that's scoped token access
its a feature we're developing for our enterprise and dedicated products
o
Ah interesting - is there a public roadmap that might indicate a rough estimate for the release date?
If it's not too much trouble, could you link me to something to explain how the multiple preshared key rotation might work?
j
no public timeline on it yet; as it is a paid feature, it'll be prioritized based on which paying customers need it
not sure we have docs on multiple keys, but it is fairly simple: SpiceDB can be started with multiple keys and they all work; to rotate, you'd deploy the cluster with the new key(s), change all clients to use the new key(s), then redeploy the cluster with the old keys removed
o
Thanks for the explanation, that really helps. I will assess our options with the team!
Also, this Discord channel is
j
glad to help!
if you have any further questions, don't hesitate to ping here or, if you want a more in-depth conversation, you can schedule a call with us
o
Great thanks - I'm sure I will have lots of questions!
j
one thing to note: if you need "just" readonly access, you can in theory deploy a "public" facing SpiceDB cluster in read-only mode, and have the "private" cluster in read-write mode, both speaking to the same datastore
but that won't provide granular access
o
Ah that's pretty flexible - the majority of our traffic to spicedb would be permission checks, so a public readonly instance would be great - more food for thought, thanks
8 Views