curl --request PUT \
--url https://api.eda.prisme.ai/v2/workspaces/{workspaceId}/security \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--data '
{
"authorizations": {
"roles": {},
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}
'{
"authorizations": {
"roles": {},
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}Update workspace security
curl --request PUT \
--url https://api.eda.prisme.ai/v2/workspaces/{workspaceId}/security \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--data '
{
"authorizations": {
"roles": {},
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}
'{
"authorizations": {
"roles": {},
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
]
},
"authentication": {
"clientId": "<string>"
}
}Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Workspace id
Show child attributes
Show child attributes
Show child attributes
Show child attributes
Show child attributes
The actions that we want to allow/deny
manage, create, read, update, delete, manage_permissions, manage_security, manage_repositories, read_app_dsul, get_usage, aggregate_search, execute, test apps, pages, files, events, workspaces, automations, secrets, roles, all The roles to which this rule is restricted
If true, will forbid instead of allow
Matching conditions written using a subset of MongoDB queries. This rule will take effect only if conditions match (or are empty). See https://casl.js.org/v5/en/guide/conditions-in-depth
Success Response
Show child attributes
Show child attributes
Show child attributes
Show child attributes
Show child attributes
The actions that we want to allow/deny
manage, create, read, update, delete, manage_permissions, manage_security, manage_repositories, read_app_dsul, get_usage, aggregate_search, execute, test apps, pages, files, events, workspaces, automations, secrets, roles, all The roles to which this rule is restricted
If true, will forbid instead of allow
Matching conditions written using a subset of MongoDB queries. This rule will take effect only if conditions match (or are empty). See https://casl.js.org/v5/en/guide/conditions-in-depth
Was this page helpful?