core.auth
coreL1 permissions semantics for membership, role, permission, and ownership
- Version
1.0.0- Namespace
core.auth- Tags
- permissionsauthorizationcorelayer-platform
Predicates
Predicate policies that control how graph statements are formed.
Exports
| Key | Exported as | From |
|---|
role-assignment | template | role-assignment |
access-mapping | template | access-mapping |
Templates
role-assignment
Create a role assignment resource and attach a has_role statementParameters
| Name | Type |
|---|
assignment-key | string |
principal-id | bigint |
role-id | bigint |
Exports
| Key | Type | From |
|---|
root | resource | assignment |
Objects Created
| Name | Type | Details |
|---|
assignment | resource | namespace: auth.role_assignment |
principal-has-role | statement | {principal-id} —[has_role]→ {role-id} |
access-mapping
Apply generic access links for a subject across memberships, roles, and permissionsParameters
| Name | Type |
|---|
mapping-key | string |
subject-id | bigint |
membership-target-ids | array |
role-target-ids | array |
permission-target-ids | array |
source | string |
Exports
| Key | Type | From |
|---|
root | resource | mapping |
Objects Created
| Name | Type | Details |
|---|
mapping | resource | namespace: auth.access_mapping |
memberships | statement | {subject-id} —[member_of]→ {"$item":true} |
roles | statement | {subject-id} —[has_role]→ {"$item":true} |
permissions | statement | {subject-id} —[has_permission]→ {"$item":true} |