You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/iam/concepts.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ With the introduction of IAM, an API key is now associated with an IAM [user](#u
34
34
35
35
## Common Expression Language (CEL)
36
36
37
-
Common Expression Language (CEL) is the expression language used to specify an expression in [conditions](#conditions) within an IAM policy. The language helps express attribute-based logic expressions. In general, a condition expression consists of one or more statements. Each statement expresses an attribute-based control rule, and ultimately determines whether the permissions applies. IAM conditions use the following CEL features: **Variables**, **Operators**, **Functions** and **Logical Operators**. Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for a detailed description of the supported CEL features.
37
+
The Common Expression Language (CEL) is used to define expressions in [conditions](#conditions) within an IAM policy. CEL allows you to create attribute-based logic expressions that determine whether specific permissions apply. A condition expression typically consists of one or more statements, each defining an attribute-based control rule. IAM conditions use the following CEL features: **Variables**, **Operators**, **Functions**, and **Logical Operators**. Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for a detailed description of the supported CEL features.
Rules define the actions that the attached principal will be able to carry out within the Organization. When creating a rule, you first set the **scope** of the rule, and then select the **permission sets** to apply within the scope. You can optionally set up **contditions** for your rule. See our dedicated documentation for more help with [policies, rules, scopes and permission sets](/iam/reference-content/policy/).
45
+
Rules define the actions that the attached principal will be able to carry out within the Organization. When creating a rule, you first set the **scope** of the rule, and then select the **permission sets** to apply within the scope. You can optionally set up **conditions** for your rule. See our dedicated documentation for more help with [policies, rules, scopes and permission sets](/iam/reference-content/policy/).
46
46
</Message>
47
47
6. Select a **scope** for the rule:
48
48
- To give the principal permissions to view, create, edit and/or delete [resources](/iam/concepts/#resource), select the **Access to resources** scope. Then, select the [Project](/iam/concepts/#project) in which you want the permissions to apply. You can select from **all current and future Projects**, **all current Projects** or select specific Projects.
@@ -55,7 +55,7 @@ An IAM [policy](/iam/reference-content/policy/) is used to define the permission
55
55
Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for more details about how to write condition expressions, as well as examples of conditions.
56
56
</Message>
57
57
11. Click **Validate**. The rule, with its scope and permission sets, is added to the list of the policy's rules.
58
-
12. Click **Add new rule** and repeat steps 6-8 as many times as required to add multiple rules to your policy.
58
+
12. Click **Add new rule** and repeat steps 6 to 8 as many times as required to add multiple rules to your policy.
59
59
<Messagetype="tip">
60
60
You can delete <Iconname="delete" /> or edit <Iconname="edit" /> an existing rule by clicking the relevant button in the top right corner of the rule's summary.
Copy file name to clipboardExpand all lines: pages/iam/quickstart.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,7 +83,7 @@ Users you have invited to your Organization, and applications you have created,
83
83
Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for more details about how to write condition expressions, as well as examples of conditions.
84
84
</Message>
85
85
11. Click **Validate**. The rule, with its scope and permission sets, is added to the list of the policy's rules.
86
-
12. Click **Add new rule** and repeat steps 6-8 as many times as required to add multiple rules to your policy.
86
+
12. Click **Add new rule** and repeat steps 6 to 8 as many times as required to add multiple rules to your policy.
87
87
<Messagetype="tip">
88
88
You can delete <Iconname="delete" /> or edit <Iconname="edit" /> an existing rule by clicking the relevant button in the top right corner of the rule's summary.
Copy file name to clipboardExpand all lines: pages/iam/reference-content/understanding-policy-conditions.mdx
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Expressions at Scaleway are defined in CEL, which provides a human-readable and
33
33
34
34
Common Expression Language is used to specify a IAM condition expression.
35
35
36
-
Expressions consist of one or more statements that declare an attribute-based control rule, and determines whether a permission applies.
36
+
Expressions consist of one or more statements that declare an attribute-based control rule, and determine whether a permission applies.
37
37
38
38
IAM conditions use the following CEL features:
39
39
- Variables
@@ -66,7 +66,7 @@ Refer to the official [CEL syntax specification](https://github.com/google/cel-s
66
66
67
67
#### Logical operators
68
68
69
-
Conditions supports three logical operators that can be used to build complex logic expressions from basic expression statements:
69
+
Conditions support three logical operators that can be used to build complex logic expressions from basic expression statements:
70
70
71
71
| Logical operator | Description | Example |
72
72
| -- | ------------------- | ------ |
@@ -77,7 +77,7 @@ Conditions supports three logical operators that can be used to build complex lo
77
77
78
78
### Functions
79
79
80
-
A function is a compound operator for data types that supports more complex operations. In condition expressions, there are predefined functions that can be used with a given data type.
80
+
A function is a compound operator for data types, that supports more complex operations. In condition expressions, predefined functions can be used with a given data type.
81
81
82
82
| Function | Description | Parameters |
83
83
| ------------ | ------------------- | ------ |
@@ -96,7 +96,7 @@ For example, if you set up a policy that grants access to a resource only on Mon
96
96
97
97
We recommend that you specify timezones when creating time-based conditions.
98
98
99
-
Refer to the official [CEL specification](https://github.com/google/cel-spec/blob/master/doc/langdef.md#timezones) for the correct grammar to express timezones in conditions.
99
+
Refer to the official [CEL specification](https://github.com/google/cel-spec/blob/master/doc/langdef.md#timezones) for the correct syntax to express timezones in conditions.
To check if a request was performed at a specific timeslot you can use the following expression. In this example, use weekdays from 9am to 5pm as a timestamp.
124
+
To check if a request was performed within a specific timeslot you can use the following expression. In this example, use weekdays from 9am to 5pm as a timestamp.
0 commit comments