Skip to content

Commit 5ca949f

Browse files
committed
fix doc
1 parent bb1cbbb commit 5ca949f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/advanced-guide/rbac/page.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -413,7 +413,7 @@ Or use role inheritance to avoid duplication:
413413
- **Never use header-based RBAC for public APIs** - Use JWT-based RBAC
414414
- **Always validate JWT tokens** - Use proper JWKS endpoints with HTTPS
415415
- **Use HTTPS in production** - Protect tokens and headers
416-
- **Monitor audit logs** - Track authorization decisions
416+
- **Monitor logs** - Track authorization decisions
417417

418418
### Configuration
419419
- **Use role inheritance** - Avoid duplicating permissions (only specify additional ones)
@@ -438,13 +438,13 @@ Or use role inheritance to avoid duplication:
438438
**Permission always denied**
439439
- Check role assignment - verify user's role has the required permission
440440
- Review role permissions - ensure `roles[].permissions` includes the required permission
441-
- Enable debug logging - check audit logs for authorization decisions
441+
- Enable debug logging - check debug logs for authorization decisions
442442

443443
**Permission always allowed**
444444
- Check if endpoint is in RBAC config - routes not in config are allowed to proceed
445445
- Check public endpoints - verify endpoint is not marked as `public: true`
446446
- Review endpoint configuration - ensure `endpoints[].requiredPermissions` is set correctly
447-
- Verify permission check - check audit logs to see if permission check is being performed
447+
- Verify permission check - check logs to see if permission check is being performed
448448

449449
**JWT role extraction failing**
450450
- Ensure OAuth middleware is enabled before RBAC
@@ -519,7 +519,7 @@ RBAC middleware implements industry-standard security practices to protect sensi
519519
- ✅ Status (allowed/denied) included
520520
- ❌ Roles excluded (avoid high cardinality and PII concerns)
521521

522-
**Audit Logs:**
522+
**Logs:**
523523
- ✅ Roles included (required for compliance: SOC 2, PCI-DSS, NIST)
524524
- ✅ HTTP method, route, status, and reason included
525525
- ❌ No authorization tokens, headers, or request bodies logged

0 commit comments

Comments
 (0)