Once the Microsegmentation Console knows the identity of the caller, it checks the API authorizations to decide if the user is allowed to perform the operation or not.
API authorizations use a tag expression that is based on the claim’s data field as a subject to assign roles to the caller.
Roles contain a list of allowed resources and operations.
For instance, the role Namespace Administrator gives full read/write permissions on a namespace while the role Enforcer only gives permissions necessary for an enforcer to work properly.
Reusing the examples in Authentication it is possible to create the following API authorizations.
As you can see below, the content of the tags in the subject field are coming from the data section of the JWT. They must be converted to @auth:<lower-case-key>=<value> to avoid any confusion with other tags.
Make the company account administrator a namespace administrator
The following API authorization makes the user, coming with a token for the account "company", an administrator on the namespace /mynamespace and all the child namespaces.