-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support open policy agent #42
Comments
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 19, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 19, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 19, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 20, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 20, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 20, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 20, 2019
ripienaar
added a commit
to ripienaar/aaasvc
that referenced
this issue
Dec 20, 2019
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
We should spike supporting OPA, the userlist might embed a rego policy into the JWT and the actionlist would evaluate the policy.
A sample policy might look like this:
this shows the user having access to all the various parts of a request - nothing about nodes as this is in the context of the signer - so just what is in the request.
Things we couldnt do before:
The text was updated successfully, but these errors were encountered: