You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/cedarling/developer/sidecar/cedarling-sidecar-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ Example request to the evaluation endpoint:
90
90
}
91
91
```
92
92
93
-
Cedarling requires OpenID Userinfo, Access, and ID tokens to construct the principal entity, as described [here](../../cedarling-authz.md). These values are sent in the subject field's properties. Furthermore, the sidecar expects the SHA256 checksum of the subject and resource's `properties` dictionary to be passed as their corresponding IDs, as shown in the example above. A more detailed example of creating an AuthZen request can be seen in the [gateway example](./cedarling-sidecar-tutorial.md#setup-test-gateway)
93
+
Cedarling requires OpenID Userinfo, Access, and ID tokens to construct the principal entity, as described [here](../../reference/cedarling-authz.md). These values are sent in the subject field's properties. Furthermore, the sidecar expects the SHA256 checksum of the subject and resource's `properties` dictionary to be passed as their corresponding IDs, as shown in the example above. A more detailed example of creating an AuthZen request can be seen in the [gateway example](./cedarling-sidecar-tutorial.md#setup-test-gateway).
94
94
95
95
Upon creating the principal, action, resource, and context entities, cedarling will evaluate these entities against the policies defined in the policy store. Then it will return a true/false decision. If the decision is false, the sidecar will analyze cedarling diagnostics and provide additional information for the admin.
Copy file name to clipboardExpand all lines: docs/cedarling/reference/cedarling-jwt-validation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -174,7 +174,7 @@ This feature is toggled with the `CEDARLING_JWT_STATUS_VALIDATION` property.
174
174
175
175
JWTs (JSON Web Tokens) contain authorization information that is used by the Cedarling to construct the Principal entities. In order to verify the authenticity of this information, the Cedarling can verify the integrity of the JWT by validating its signature and status(active, expired, or revoked). It does so by fetching the public keyset and the list of active tokens from the issuer of the JWT.
Copy file name to clipboardExpand all lines: docs/cedarling/reference/cedarling-lock-server.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ After creation, **export the SSA token** and save it securely.
46
46
47
47
### 2. Setting up the Interception Script
48
48
49
-
Next, configure an [*interception script*](../janssen-server/developer/interception-scripts.md) to automatically add the required scopes when a Cedarling client registers.
49
+
Next, configure an [*interception script*](../../janssen-server/developer/scripts/README.md) to automatically add the required scopes when a Cedarling client registers.
50
50
51
51
In your server, create a script file at `/opt/jans/jetty/jans-auth/custom/script/add_cedarling_scopes.py` with the following content:
52
52
@@ -170,24 +170,24 @@ Next, create a JSON file named `script_schema.json` with the following content:
"description": "space-separated scopes that will be added by the script"
184
+
},
185
+
{
186
+
"value1": "trigger_scope",
187
+
"value2": "cedarling",
188
+
"hide": false,
189
+
"description": "the scope that must be present for the script to run"
190
+
}
191
191
],
192
192
"level": 100,
193
193
"revision": 0,
@@ -239,7 +239,7 @@ A successful response will contain the following scopes:
239
239
240
240
> Note:
241
241
>
242
-
> If you want to learn more about configuring the example interception script, see the [reference](../janssen-server/developer/interception-scripts.md).
242
+
> If you want to learn more about configuring the example interception script, see the [reference](../../janssen-server/developer/scripts/README.md).
@@ -63,7 +63,7 @@ Handled via `JwtService` in the `jwt` module. JWTs from untrusted issuers are re
63
63
64
64
Criteria for valid JWT:
65
65
* Comes from a trusted issuer:
66
-
* Has a defined [token metadata](../../../cedarling/cedarling-policy-store.md#token-metadata-schema)
66
+
* Has a defined [token metadata](../../../cedarling/reference/cedarling-policy-store.md#token-metadata-schema)
67
67
68
68
69
69
@@ -73,7 +73,7 @@ Handled via `EntityBuilder` in the `entity_builder` module. JWTs from untrusted
73
73
74
74
JWT claims are mapped to Cedar attributes (1:1 by default).
75
75
76
-
Mappings are configured via the Token Entity Metadata Schema's `claim mapping` field in the [Policy Store](../../../cedarling/cedarling-policy-store.md#claim-mapping).
76
+
Mappings are configured via the Token Entity Metadata Schema's `claim mapping` field in the [Policy Store](../../../cedarling/reference/cedarling-policy-store.md#claim-mapping).
0 commit comments