Set Initial Pod Clients Allow List
The default ACP policies for a new Pod states that for an agent whose WebID matches the Pod owner and is using an application whose ClientID matches a value listed in the policy, that agent is allowed Read and Write access.
Authorization Service uses its INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST configuration to initialize the client matcher portion of the initial policies.
If INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST is unset, ESS uses the Authorization service’s INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST instead. See Set Authorization Client Allow List for details on configuring.
Example Customization
The following customization updates INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST .
Go to your ESS installation directory:
cd ${HOME}/essCreate a
authz-default-acr-client-id-allow-list.yamlfile with the following content:apiVersion: apps/v1 kind: Deployment metadata: name: ess-authorization-acp spec: template: spec: containers: - env: - name: INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST value: https://myPodApp.example.com/appid name: ess-authorization-acpModify the
kustomization.yaml(i.e., step 3 of the Applying Your Customizations procedure) to useauthz-default-acr-client-id-allow-list. Specifically, add the highlighted content to thekustomization.yamlfile to thepatchessection:
# kustomization.yaml in your ESS installation directory
# ... Preceding content omitted for brevity
# ...
patches:
- path: authz-default-acr-client-id-allow-list.yaml4. Continue with the rest of the Applying Your Customizations procedure.
Last updated