|
1 | 1 | import { Callout, Tabs } from 'nextra/components' |
2 | | -import { Bleed } from 'nextra-theme-docs' |
3 | 2 |
|
4 | 3 | # Restricted API Access |
5 | 4 |
|
@@ -62,8 +61,6 @@ The command should output the hash, which can be referenced in your static confi |
62 | 61 | 71c73ba92f2032416b18a4f4fffb2a825755bea6a8430f2622ab1f3fb35a10d0 |
63 | 62 | ``` |
64 | 63 |
|
65 | | -[static configuration]: #static-configuration |
66 | | - |
67 | 64 | ### Roles |
68 | 65 |
|
69 | 66 | Roles define rules for accessing the SpiceDB API. |
@@ -189,18 +186,29 @@ This CEL expression limits CheckPermissions requests to only be able to check a |
189 | 186 | CheckPermissionRequest.permission == "admin" |
190 | 187 | ``` |
191 | 188 |
|
192 | | -## Static Configuration |
| 189 | +## Configuration |
193 | 190 |
|
194 | | -Enterprise builds of SpiceDB can have their API access configured statically with a YAML configuration file. |
| 191 | +The process for setting up this feature varies depending on the AuthZed product you're using. |
195 | 192 |
|
196 | | -<Callout type="warning"> |
197 | | - These configuration files contain hashes of Tokens and should be treated like secrets. |
198 | | -</Callout> |
| 193 | +### Dedicated & Cloud |
| 194 | + |
| 195 | +Using the web dashboard, navigate to the Permission System's "Access" tab. |
| 196 | + |
| 197 | +### Self-Hosted |
199 | 198 |
|
200 | | -This functionality is configured with the following flag: |
| 199 | +Use the following command-line flags: |
201 | 200 |
|
202 | | -- `--extender-enabled authzed-fgam` |
203 | | -- `--extender-authzed-fgam-endpoint /path/to/configuration.yaml` |
| 201 | +| Flag | Description | Default | |
| 202 | +|---------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------| |
| 203 | +| --extender-authzed-fgam-endpoint | defines the external SpiceDB endpoint used to authorize operations for the authzed-fgam extender. If a file:// endpoint is provided, server is run embedded with static configuration | | |
| 204 | +| --extender-authzed-fgam-preshared-key | defines the external SpiceDB preshared key used to authorize operations for the authzed-fgam extender. Ignored if endpoint is local (file://) | | |
| 205 | +| --extender-enabled | must be set to `authzed-fgam` | | |
| 206 | + |
| 207 | +If you set `--extender-authzed-fgam-endpoint` to a file, it must be a YAML configuration file. |
| 208 | + |
| 209 | +<Callout type="warning"> |
| 210 | + This configuration file should be treated like a secret because it contains token hashes. |
| 211 | +</Callout> |
204 | 212 |
|
205 | 213 | Here's an example showcasing the structure of static configuration: |
206 | 214 |
|
@@ -235,7 +243,7 @@ policy: |
235 | 243 |
|
236 | 244 | ## Enabling without downtime |
237 | 245 |
|
238 | | -If you want to apply a static configuration to an existing SpiceDB cluster without downtime, you must conduct an upgrade process with the following steps: |
| 246 | +If you want to apply a configuration to an existing SpiceDB cluster without downtime, you must conduct an upgrade process with the following steps: |
239 | 247 |
|
240 | 248 | 1. Create pre-shared keys that follow the token format for each client of your SpiceDB instance. |
241 | 249 | You should add those to your SpiceDB instance configuration. |
|
0 commit comments