Prisme.ai Workspaces
Put v2workspaces security
AI Builder Endpoints
- API Gateway
- permissions
- Prisme.ai Events
- Prisme.ai Runtime
- Prisme.ai Workspaces
- GETGet v2workspaces
- POSTPost v2workspaces
- GETGet v2workspaces
- DELDelete v2workspaces
- PATCHPatch v2workspaces
- POSTPost v2workspacesimport
- POSTPost v2workspaces import
- GETGet v2workspaces versions
- POSTPost v2workspaces versions
- DELDelete v2workspaces versions
- POSTPost v2workspaces versions pull
- POSTPost v2workspaces versions duplicate
- POSTPost v2workspaces versions export
- GETGet v2workspaces status
- POSTPost v2workspacesexport
- POSTPost v2workspaces automations
- GETGet v2workspaces automations
- DELDelete v2workspaces automations
- PATCHPatch v2workspaces automations
- POSTPost v2workspaces test
- GETGet v2workspaces pages
- POSTPost v2workspaces pages
- GETGet v2workspaces pages
- DELDelete v2workspaces pages
- PATCHPatch v2workspaces pages
- GETGet v2pages
- GETGet v2workspaces security
- PUTPut v2workspaces security
- GETGet v2workspaces securityroles
- GETGet v2apps
- POSTPost v2apps
- GETGet v2apps
- DELDelete v2apps
- GETGet v2workspaces apps
- POSTPost v2workspaces apps
- GETGet v2workspaces apps config
- PATCHPatch v2workspaces apps config
- GETGet v2workspaces apps
- DELDelete v2workspaces apps
- PATCHPatch v2workspaces apps
- GETGet v2workspaces files
- DELDelete v2workspaces files
- PATCHPatch v2workspaces files
- GETGet v2workspaces files
- POSTPost v2workspaces files
- POSTPost v2workspaces files share
- GET
- Secrets
- ApiKeys
Prisme.ai Workspaces
Put v2workspaces security
Update workspace security
PUT
/
v2
/
workspaces
/
{workspaceId}
/
security
curl --request PUT \
--url https://api.eda.prisme.ai/v2/workspaces/{workspaceId}/security \
--header 'Content-Type: application/json' \
--header 'X-Prismeai-API-Key: <api-key>' \
--data '{
"authorizations": {
"roles": {},
"rules": [
{
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"action": "manage",
"subject": "apps",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}'
{
"authorizations": {
"roles": {},
"rules": [
{
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"action": "manage",
"subject": "apps",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}
Path Parameters
Workspace id
Body
application/json
The actions that we want to allow/deny
Available options:
manage
, create
, read
, update
, delete
, manage_permissions
, manage_security
, manage_repositories
, read_app_dsul
, get_usage
, aggregate_search
, execute
, test
Available options:
apps
, pages
, files
, events
, workspaces
, automations
, secrets
, roles
, all
The roles to which this rule is restricted
If true, will forbid instead of allow
Matching conditions written using a subset of MongoDB queries. This rule will take effect only if conditions match (or are empty). See https://casl.js.org/v5/en/guide/conditions-in-depth
Response
200
application/json
Success Response
The actions that we want to allow/deny
Available options:
manage
, create
, read
, update
, delete
, manage_permissions
, manage_security
, manage_repositories
, read_app_dsul
, get_usage
, aggregate_search
, execute
, test
Available options:
apps
, pages
, files
, events
, workspaces
, automations
, secrets
, roles
, all
The roles to which this rule is restricted
If true, will forbid instead of allow
Matching conditions written using a subset of MongoDB queries. This rule will take effect only if conditions match (or are empty). See https://casl.js.org/v5/en/guide/conditions-in-depth
Was this page helpful?
curl --request PUT \
--url https://api.eda.prisme.ai/v2/workspaces/{workspaceId}/security \
--header 'Content-Type: application/json' \
--header 'X-Prismeai-API-Key: <api-key>' \
--data '{
"authorizations": {
"roles": {},
"rules": [
{
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"action": "manage",
"subject": "apps",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}'
{
"authorizations": {
"roles": {},
"rules": [
{
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"action": "manage",
"subject": "apps",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}