File tree Expand file tree Collapse file tree 1 file changed +21
-1
lines changed Expand file tree Collapse file tree 1 file changed +21
-1
lines changed Original file line number Diff line number Diff line change @@ -264,6 +264,26 @@ If you want to apply a static configuration to an existing SpiceDB cluster witho
264264 This is probably lower risk, and then from there you can move to start trimming down permissions.
265265 2 . Or you may want to move directly to downscoped tokens for your individual services, creating the tokens you need.
266266 This may be simple if you have few clients, but more complex as the number of clients grow, and with a bigger blast radious of impact on rollout.
267+ A minimal configuration would look something like:
268+
269+ ``` yaml
270+ role :
271+ - id : " admin"
272+ permission :
273+ authzed.v1/CheckPermission : " "
274+ service_account :
275+ - id : " my_microservice"
276+ token :
277+ - id : " token_01"
278+ hash : " 1d619ac2f5013845c5f2df93add92fc87e88ca6c57d19a77d1b189663f1ff5b0"
279+ policy :
280+ - id : " microservice_with_admin"
281+ principal_id : " my_microservice"
282+ principal_type : " service_account"
283+ roles :
284+ - " admin"
285+ ` ` `
286+
2672873. Set the created tokens as valid preshared keys in your SpiceDB instance.
268288 You can do this by defining multiple PSKs via the ENV or flags as comma separated values:
269289
@@ -276,4 +296,4 @@ If you want to apply a static configuration to an existing SpiceDB cluster witho
2762965 . Deploy SpiceDB with the new Restricted Access configuration.
277297
278298Prior to the migration, the keys that your client sends will be treated as preshared keys.
279- After the migration, the keys that your client sends will be treated as Restricted Access keys and flow through the extender .
299+ After the migration, the keys that your client sends will be treated as Restricted Access keys.
You can’t perform that action at this time.
0 commit comments