diff --git a/authorization_services/keycloak-images/permission/create-resource.png b/authorization_services/keycloak-images/permission/create-resource.png index e4b1c1d36c..f50ec7aee8 100644 Binary files a/authorization_services/keycloak-images/permission/create-resource.png and b/authorization_services/keycloak-images/permission/create-resource.png differ diff --git a/authorization_services/keycloak-images/permission/create-scope.png b/authorization_services/keycloak-images/permission/create-scope.png index 6ba0c886a3..f635d97ff5 100644 Binary files a/authorization_services/keycloak-images/permission/create-scope.png and b/authorization_services/keycloak-images/permission/create-scope.png differ diff --git a/authorization_services/keycloak-images/permission/typed-resource-perm-example.png b/authorization_services/keycloak-images/permission/typed-resource-perm-example.png index 678bc44747..2dbd01b7cc 100644 Binary files a/authorization_services/keycloak-images/permission/typed-resource-perm-example.png and b/authorization_services/keycloak-images/permission/typed-resource-perm-example.png differ diff --git a/authorization_services/keycloak-images/permission/view.png b/authorization_services/keycloak-images/permission/view.png index fa4a185c73..2078015d13 100644 Binary files a/authorization_services/keycloak-images/permission/view.png and b/authorization_services/keycloak-images/permission/view.png differ diff --git a/authorization_services/topics/permission-create-resource.adoc b/authorization_services/topics/permission-create-resource.adoc index 67cc36cf4a..223be9d592 100644 --- a/authorization_services/topics/permission-create-resource.adoc +++ b/authorization_services/topics/permission-create-resource.adoc @@ -3,12 +3,7 @@ A resource-based permission defines a set of one or more resources to protect using a set of one or more authorization policies. -ifeval::[{project_community}==true] -To create a new resource-based permission, select *Create resource-based permission* from the *Create permission* dropdown. -endif::[] -ifeval::[{project_product}==true] To create a new resource-based permission, select *Resource-based* in the item list in the upper right corner of the permission listing. -endif::[] .Add Resource Permission image:{project_images}/permission/create-resource.png[alt="Add Resource Permission"] @@ -37,12 +32,7 @@ Defines the resource type to protect. When defined, this permission is evaluated + Defines a set of one or more resources to protect. -ifeval::[{project_community}==true] -* *Policy* -endif::[] -ifeval::[{project_product}==true] * *Apply Policy* -endif::[] + Defines a set of one or more policies to associate with a permission. To associate a policy you can either select an existing policy or create a new one by selecting the type of the policy you want to create. diff --git a/authorization_services/topics/permission-create-scope.adoc b/authorization_services/topics/permission-create-scope.adoc index de346e148c..d91567c1ad 100644 --- a/authorization_services/topics/permission-create-scope.adoc +++ b/authorization_services/topics/permission-create-scope.adoc @@ -3,12 +3,7 @@ A scope-based permission defines a set of one or more scopes to protect using a set of one or more authorization policies. Unlike resource-based permissions, you can use this permission type to create permissions not only for a resource, but also for the scopes associated with it, providing more granularity when defining the permissions that govern your resources and the actions that can be performed on them. -ifeval::[{project_community}==true] -To create a new scope-based permission, select *Create scope-based permission* from the *Create permission* dropdown. -endif::[] -ifeval::[{project_product}==true] To create a new scope-based permission, select *Scope-based* in the item list in the upper right corner of the permission listing. -endif::[] .Add Scope Permission image:{project_images}/permission/create-scope.png[alt="Add Scope Permission"] @@ -32,12 +27,7 @@ Restricts the scopes to those associated with the selected resource. If none is + Defines a set of one or more scopes to protect. -ifeval::[{project_community}==true] -* *Policy* -endif::[] -ifeval::[{project_product}==true] * *Apply Policy* -endif::[] + Defines a set of one or more policies to associate with a permission. To associate a policy you can either select an existing policy or create a new one by selecting the type of the policy you want to create.