diff --git a/authorization_services/images/policy/create-regex.png b/authorization_services/images/policy/create-regex.png new file mode 100644 index 0000000000..31e1bcffa3 Binary files /dev/null and b/authorization_services/images/policy/create-regex.png differ diff --git a/authorization_services/topics.adoc b/authorization_services/topics.adoc index 7c897cdab4..f41e901c8f 100644 --- a/authorization_services/topics.adoc +++ b/authorization_services/topics.adoc @@ -58,6 +58,8 @@ include::topics/policy-client-scope-policy.adoc[leveloffset=+2] include::topics/policy-client-scope-policy-required-client-scope.adoc[leveloffset=+3] +include::topics/policy-regex-policy.adoc[leveloffset=+2] + include::topics/policy-logic.adoc[leveloffset=+2] include::topics/policy-evaluation-api.adoc[leveloffset=+2] diff --git a/authorization_services/topics/policy-regex-policy.adoc b/authorization_services/topics/policy-regex-policy.adoc new file mode 100644 index 0000000000..761c5a00a7 --- /dev/null +++ b/authorization_services/topics/policy-regex-policy.adoc @@ -0,0 +1,31 @@ +[[_policy_regex]] += Regex-Based Policy + +You can use this type of policy to define regex conditions for your permissions. + +To create a new regex-based policy, select *Regex* in the item list in the upper right corner of the policy listing. + +.Add Regex-Based Policy +image:images/policy/create-regex.png[alt="Add Regex-Based Policy"] + +== Configuration + +* *Name* ++ +A human-readable and unique string describing the policy. A best practice is to use names that are closely related to your business and security requirements, so you can identify them more easily. ++ +* *Description* ++ +A string containing details about this policy. ++ +* *Target Claim* ++ +Specifies the name of the target claim in the token. ++ +* *Regex Pattern* ++ +Specifies the regex pattern. ++ +* *Logic* ++ +The <<_policy_logic, Logic>> of this policy to apply after the other conditions have been evaluated.