URL Authorization
Out-of-the-box, RS Gateway supports Create, Read, Update, and Delete authentication (CRUD-based authorization) using CRUD-based permissions on the RS Gateway APIs.
For example, to call any of the POST APIs (Create) you must have the permission
MTX_ROLE_RSG_CREATE
. With this role, you can call any POST API.
URL authorization requires an authenticated identity. The authentication credential determines whether a user is allowed to access restricted resources. RS Gateway attempts to match users to a role based on the credential, and either maps the user to permitted roles
or returns a not authorized
value that prevents the user from being mapped to any role.
- /rsgateway/data/v3/device/{oid}/offer
- /rsgateway/data/json/device/{oid}/offer
- /rsgateway/data/openapi/{oid}/offer
The rsgateway_permissions.yaml file operates on MATRIXX REST handlers, such as the REST handler to get the OpenAPI3 specification and the pricing cache REST services. This permissions file impacts individual URLs, so permissions can be different for OpenAPI3, JSON, or named REST services.
Before proceeding, you should decide the scope of the permissions that you want to define.