Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Does warden groups work with internal Hydra APIs? #823

Closed
bdudelsack opened this issue Apr 19, 2018 · 4 comments
Closed

Does warden groups work with internal Hydra APIs? #823

bdudelsack opened this issue Apr 19, 2018 · 4 comments
Assignees
Milestone

Comments

@bdudelsack
Copy link

I'm trying to create a group of superadmins which members can access the Hydra API but it does not work.

Am i understanding right that the internal Access Controll of Hydra API does not support subjects like "groups:..." and only work with user IDs?

Sample policy:

{
    "id": "group-superadmins",
    "description": "Allow everyhting for members of the superadmin group",
    "subjects": [
        "groups:superadmins"
    ],
    "effect": "allow",
    "resources": [
        "rn:hydra:<.*>"
    ],
    "actions": [
        "<.*>"
    ],
    "conditions": {}
}
@aeneasr
Copy link
Member

aeneasr commented Apr 19, 2018

Hi, this has been an issue elsewhere too, the groups: prefix is not fixed! You have to literally name your group groups:my-group. If the ID of your group is my-group, than it is not prefixed with groups:.

@bdudelsack
Copy link
Author

That works. Thank you!

@aeneasr aeneasr closed this as completed Apr 20, 2018
@aeneasr aeneasr reopened this Apr 20, 2018
@aeneasr
Copy link
Member

aeneasr commented Apr 20, 2018

Reopening, because you're the third or fourth person having that misconception. Should be fixed in the docs.

@aeneasr aeneasr added the docs label Apr 20, 2018
@aeneasr aeneasr self-assigned this Apr 20, 2018
@aeneasr aeneasr added this to the 1.0.0 milestone Apr 20, 2018
@aeneasr
Copy link
Member

aeneasr commented Apr 29, 2018

Ok, so this has changed significantly over the past few weeks as access control is now optional and configured via oathkeeper and keto. I'll update the docs before the release.

@aeneasr aeneasr closed this as completed Apr 29, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants