Access Rules
Access rules provide users, groups, or service accounts privileges to system entities. An access rule is the assignment of a role to a subject in a scope: <Subject> is a <Role> in a <Scope>.
Scope Behavior
When creating an access rule, the scopeType and associated scope identifier, scopeId, determine where the access rule is available and who can use it in a multi-tenant environment:
scopeType = system- Creates a global access rule that applies that is available across all customer tenants.scopeType = tenant+ customer tenant ID - Creates an access rule that applies only within that customer tenant usingscopeId.scopeType = tenant+ Console/system tenant ID - Creates an access rule scoped to the platform owner (host organization) tenant usingscopeId.
Privileged Escalation Enforcement
When creating access rules across tenants, apply the principle of no privilege escalation:
A user can assign roles only within the limits of their own permissions.
Assigning a role that grants broader permissions than the caller is blocked or restricted by the platform.
Create an Access Rule
To create an access rule:
Send a
POSTrequest to the/api/v1/authorization/access-rulesendpoint. See Access rules API for more details.Provide the following:
The subject you want to assign a role to:
subjectType:user,group, orservice-accountsubjectId: the unique identifier for that subject (for example, a user email or group name)
The role ID you want to assign (
roleId). See Roles API to retrieve a list of roles.The scope where the access rule applies:
scopeType:systemortenantscopeId: the identifier of the system tenant or customer tenant
Example: Assign a role at system scope (global context):
Example: Assign a role within a specific customer tenant:
Example: Assign a role within the console/system tenant:
Last updated