Skip to content

Commit 735cf20

Browse files
authored
Updates Dynamic RBAC README image inclusion
1 parent a632825 commit 735cf20

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

examples/BaSyxDynamicRBAC/README.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* The administrator of the system controls the policy/access rules inside the Submodel.
55
* Rules can be added or deleted during the system's runtime.
66

7-
<img width="60%" alt="image" src="./images/DynamicRBACMgmt.png">
7+
![BaSyx RBAC Architecture](./images/DynamicRBACMgmt.png)
88

99
## Prerequisites
1010
1. REST API Client (e.g., [Postman](https://www.postman.com/downloads/))
@@ -20,15 +20,15 @@ docker-compose up -d
2020
This will start the BaSyx components and the Keycloak server. The Keycloak server can be found at http://localhost:9097.
2121
There you can login as admin with username `admin` and password `keycloak-admin`.
2222

23-
<img width="60%" alt="image" src="./images/users.png">
23+
![Users](./images/users.png)
2424

2525
The example comes with an already configured realm `BaSyx` and a user `john.doe` with password `johndoe`.
2626
This user has the `admin` role and can access all BaSyx components and all information about each component.
2727

2828
The entry point for accessing the Asset Administration Shells and their Submodels is the AAS Web UI running at http://localhost:3000.
2929
After opening the page you will be redirected to the Keycloak login page. Use the credentials of user `john.doe` to log in.
3030

31-
<img width="60%" alt="image" src="./images/login.png">
31+
![Login](./images/login.png)
3232

3333
## Security in BaSyx
3434

@@ -112,7 +112,8 @@ Following shows how a JSON based RBAC rule looks like a Submodel-based rule:
112112
| ManufacturerFrame | dave | dave |
113113
| ManufacturerGear | dave | dave |
114114

115-
<img width="60%" alt="image" src="./images/AASDS2.png">
115+
![Dataspace](./images/AASDS2.png)
116+
116117

117118
### View Rules for this example
118119

@@ -139,7 +140,7 @@ Similarly, you can create idShorts using the below TargetInformation class as pe
139140

140141
### Scenario
141142

142-
<img width="80%" alt="image" src="./images/BicycleExampleDataspaceFlow_short.png">
143+
![Bicycle Example](./images/BicycleExampleDataspaceFlow_short.png)
143144

144145
* When Frame Supplier delivers the product they also add a policy/rule (using Dynamic RBAC) so that the manufacturer can see the Digital Twin of the supplied product.
145146
- Postman -> AASDataspace -> Rules -> Frame (In Postman collection)

0 commit comments

Comments
 (0)