@@ -24,14 +24,12 @@ var (
2424var defaultRoleClaim = "realm_access.roles"
2525
2626var defaultRoleMap = map [string ]string {
27- "standard" : "opentdf-standard" ,
28- "admin" : "opentdf-admin" ,
29- "org-admin" : "opentdf-org-admin" ,
27+ "standard" : "opentdf-standard" ,
28+ "admin" : "opentdf-admin" ,
3029}
3130
3231var defaultPolicy = `
3332## Roles (prefixed with role:)
34- # org-admin - organization admin
3533# admin - admin
3634# standard - standard
3735# unknown - unknown role or no role
@@ -46,70 +44,35 @@ var defaultPolicy = `
4644# delete - delete the resource
4745# unsafe - unsafe actions
4846
49- # Role: Org-Admin
50- ## gRPC routes
51- p, role:org-admin, policy.*, *, allow
52- p, role:org-admin, kasregistry.*, *, allow
53- p, role:org-admin, kas.AccessService/Rewrap, *, allow
54- p, role:org-admin, authorization.*, *, allow
55- ## HTTP routes
56- p, role:org-admin, /attributes*, *, allow
57- p, role:org-admin, /namespaces*, *, allow
58- p, role:org-admin, /subject-mappings*, *, allow
59- p, role:org-admin, /resource-mappings*, *, allow
60- p, role:org-admin, /key-access-servers*, *, allow
61- p, role:org-admin, /kas/v2/rewrap, *, allow
62- p, role:org-admin, /unsafe*, *, allow
63- p, role:org-admin, /v1/entitlements, *, allow
64- p, role:org-admin, /v1/authorization, *, allow
65- p, role:org-admin, /v1/token/authorization, *, allow
6647
6748# Role: Admin
68- ## gRPC routes
69- p, role:admin, policy.*, read, allow
70- p, role:admin, policy.*, write, allow
71- p, role:admin, policy.*, delete, allow
72- p, role:admin, kasregistry.*, *, allow
73- p, role:admin, kas.AccessService/Rewrap, *, allow
74- p, role:admin, authorization.*, *, allow
75- ## HTTP routes
76- p, role:admin, /attributes*, *, allow
77- p, role:admin, /namespaces*, *, allow
78- p, role:admin, /subject-mappings*, *, allow
79- p, role:admin, /resource-mappings*, *, allow
80- p, role:admin, /key-access-servers*, *, allow
81- p, role:admin, /kas/v2/rewrap, *, allow
82- p, role:admin, /v1/entitlements, *, allow
83- p, role:admin, /v1/authorization, *, allow
84- p, role:admin, /v1/token/authorization, *, allow
85-
49+ ## gRPC and HTTP routes
50+ p, role:admin, *, *, allow
8651
8752## Role: Standard
8853## gRPC routes
8954p, role:standard, policy.*, read, allow
9055p, role:standard, kasregistry.*, read, allow
91- p, role:standard, kas.AccessService/Rewrap, *, allow
92- p, role:standard, authorization.AuthorizationService/GetDecisions, read, allow
93- p, role:standard, authorization.AuthorizationService/GetDecisionsByToken, read, allow
56+ p, role:standard, kas.AccessService/Rewrap, *, allow
57+ p, role:standard, authorization.AuthorizationService/GetDecisions, read, allow
58+ p, role:standard, authorization.AuthorizationService/GetDecisionsByToken, read, allow
59+
9460## HTTP routes
9561p, role:standard, /attributes*, read, allow
9662p, role:standard, /namespaces*, read, allow
9763p, role:standard, /subject-mappings*, read, allow
9864p, role:standard, /resource-mappings*, read, allow
9965p, role:standard, /key-access-servers*, read, allow
10066p, role:standard, /kas/v2/rewrap, write, allow
101- p, role:standard, /entityresolution/resolve, write, allow
102- p, role:standard, /v1/authorization, write, allow
103- p, role:standard, /v1/token/authorization, write, allow
67+ p, role:standard, /v1/authorization, write, allow
68+ p, role:standard, /v1/token/authorization, write, allow
10469
10570# Public routes
10671## gRPC routes
10772## for ERS, right now we don't care about requester role, just that a valid jwt is provided when the OPA engine calls (enforced in the ERS itself, not casbin)
108- p, role:unknown, entityresolution.EntityResolutionService.ResolveEntities, write, allow
10973p, role:unknown, kas.AccessService/Rewrap, *, allow
11074## HTTP routes
11175## for ERS, right now we don't care about requester role, just that a valid jwt is provided when the OPA engine calls (enforced in the ERS itself, not casbin)
112- p, role:unknown, /entityresolution/resolve, write, allow
11376p, role:unknown, /kas/v2/rewrap, *, allow
11477
11578`
0 commit comments