-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add token
ACL templating support
#7761
Conversation
I do not believe the |
I don't think we want to merge this; display name is usually unreliable and can often be set by relatively unprivileged users. What about Identity doesn't work here? What's the use case? |
More than happy to drop Identity looks like a great way to deal with dynamic policy, but the requirement for Being able to target properties on the token would be incredibly helpful, even if those properties were limited to Very willing to make any changes you all deem necessary, avoiding dynamically generated identifiers in dynamic (templated) policies is our goal. |
Hi there! Thanks for the PR. We discussed this internally, as I wanted to make sure to get you an answer for this PR as it's on the older side. Unfortunately, this isn't something we're planning to support. In particular, there are two parts of our responses to these that explain our position and hopefully offer an alternative. Hopefully the following answers satisfy you:
and
Thanks for raising this, and we appreciate the contribution. However, we feel like the 'right' way to do this is using the identity system. Token metadata is quite low privilege. |
Adds the ability to target
token.metadata.*
in policy templates