You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/preview/abac-repo-permissions/README.md
+32Lines changed: 32 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -358,6 +358,38 @@ By following these steps, users will have read access to all repositories with t
358
358
359
359

360
360
361
+
#### Scenario: Different ABAC conditions for different actions
362
+
363
+
This section applies for the scenario where you need to:
364
+
365
+
1. Grant read and pull permissions to all child repositories under the `application/frontend/` namespace, such as `application/frontend/platform` and `application/frontend/code`.
366
+
2. Grant push and delete permissions to repositories under the `application/frontend/` namespace except `application/frontend/readonly`.
367
+
368
+
To meet the requirements, you can set different conditions for different actions in a single role assignment.
369
+
370
+
1. Use the **+ Add condition** to add the first condition:
371
+
372
+

373
+
374
+
2. Use the **+Add action** to select readonly actions that apply to the first condition and use the **+Add expression** to build an expression for the actions:
375
+
376
+

377
+
378
+
3. Use the **+ Add condition** to add the second condition for push action. The push action needs to be added separately because it attribute source is different from other actions.
379
+
380
+

381
+
382
+
3. Use the **+ Add condition** to add the third condition for other actions.
383
+
384
+

385
+
386
+
4. Review the conditions to ensure they align with the desired access limitations. You can set editor type to **Code** to inspect the conditions code:
387
+
388
+

389
+
390
+
5. Use **Save** to confirm the role assignment to enforce the scoped permissions.
391
+
392
+
361
393
## Private Preview Limitations of ABAC-Enabled Repository Permissions
362
394
363
395
During the private preview of ABAC-enabled Repository Permissions, there are a few limitations that you should be aware of:
0 commit comments