Caveat for ABAC+RBAC working on playground but not on local dev #2194
Unanswered
jithinprasadr
asked this question in
Q&A
Replies: 2 comments 4 replies
-
I just ran this locally and it still seems to work as expected:
How are you testing it locally? |
Beta Was this translation helpful? Give feedback.
1 reply
-
Are you sure that the consistency syntax is correct on postman? I've never used postman for gRPC; does it error when it can't correctly serialize something or silently omit it? I could see this being a silent fallback to I'd also retry with a minimal subset of the relations you're writing, and make sure that the relations match your intent. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi,
I am trying to implement a RBAC+ABAC requirement.
There are two types of users - admin users and managers. The documents that are readable by admins are a readable by their managers as well. Additionally managers can read all documents that are accessible to any admin. But there is a restriction for managers based on their current role. The manager has the ability to switch to a normal admin. In this case, the manager can only access the documents that are readable under their admin. If they switch to manager role, then they can read any document.
To address this scenario, I created a group to represent admin and managers and document are associated to groups.
Inorder to supply the current role of manager, I created a caveat and matches the value for access.
I tried the same in spicedb playground and is working fine
https://play.authzed.com/s/Di5XFplvHjqy/assertions
But when I tried the same in the local machine, the permission is denied for the first assert.
Need to know what configuration is missing in my local machine
Result of CheckPermission:
Beta Was this translation helpful? Give feedback.
All reactions