Policy configuration

Warning

JSON formatted policy file is deprecated since Barbican 12.0.0 (Wallaby). This oslopolicy-convert-json-to-yaml tool will migrate your existing JSON-formatted policy file to YAML in a backward-compatible way.

Configuration

The following is an overview of all available policies in Barbican. For a sample configuration file.

barbican

secret_project_match
Default

project_id:%(target.secret.project_id)s

(no description provided)

secret_project_reader
Default

role:reader and rule:secret_project_match

(no description provided)

secret_project_member
Default

role:member and rule:secret_project_match

(no description provided)

secret_project_admin
Default

role:admin and rule:secret_project_match

(no description provided)

secret_owner
Default

user_id:%(target.secret.creator_id)s

(no description provided)

secret_is_not_private
Default

True:%(target.secret.read_project_access)s

(no description provided)

secret_acl_read
Default

'read':%(target.secret.read)s

(no description provided)

container_project_match
Default

project_id:%(target.container.project_id)s

(no description provided)

container_project_member
Default

role:member and rule:container_project_match

(no description provided)

container_project_admin
Default

role:admin and rule:container_project_match

(no description provided)

container_owner
Default

user_id:%(target.container.creator_id)s

(no description provided)

container_is_not_private
Default

True:%(target.container.read_project_access)s

(no description provided)

container_acl_read
Default

'read':%(target.container.read)s

(no description provided)

order_project_match
Default

project_id:%(target.order.project_id)s

(no description provided)

order_project_member
Default

role:member and rule:order_project_match

(no description provided)

audit
Default

role:audit

(no description provided)

observer
Default

role:observer

(no description provided)

creator
Default

role:creator

(no description provided)

admin
Default

role:admin

(no description provided)

service_admin
Default

role:key-manager:service-admin

(no description provided)

all_users
Default

rule:admin or rule:observer or rule:creator or rule:audit or rule:service_admin

(no description provided)

all_but_audit
Default

rule:admin or rule:observer or rule:creator

(no description provided)

admin_or_creator
Default

rule:admin or rule:creator

(no description provided)

secret_creator_user
Default

user_id:%(target.secret.creator_id)s

(no description provided)

secret_private_read
Default

'False':%(target.secret.read_project_access)s

(no description provided)

secret_non_private_read
Default

rule:all_users and rule:secret_project_match and not rule:secret_private_read

(no description provided)

secret_decrypt_non_private_read
Default

rule:all_but_audit and rule:secret_project_match and not rule:secret_private_read

(no description provided)

secret_project_creator
Default

rule:creator and rule:secret_project_match and rule:secret_creator_user

(no description provided)

secret_project_creator_role
Default

rule:creator and rule:secret_project_match

(no description provided)

container_private_read
Default

'False':%(target.container.read_project_access)s

(no description provided)

container_creator_user
Default

user_id:%(target.container.creator_id)s

(no description provided)

container_non_private_read
Default

rule:all_users and rule:container_project_match and not rule:container_private_read

(no description provided)

container_project_creator
Default

rule:creator and rule:container_project_match and rule:container_creator_user

(no description provided)

container_project_creator_role
Default

rule:creator and rule:container_project_match

(no description provided)

secret_acls:get
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • GET /v1/secrets/{secret-id}/acl

Scope Types
  • project

Retrieve the ACL settings for a given secret.If no ACL is defined for that secret, then Default ACL is returned.

secret_acls:delete
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • DELETE /v1/secrets/{secret-id}/acl

Scope Types
  • project

Delete the ACL settings for a given secret.

secret_acls:put_patch
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • PUT /v1/secrets/{secret-id}/acl

  • PATCH /v1/secrets/{secret-id}/acl

Scope Types
  • project

Create new, replaces, or updates existing ACL for a given secret.

container_acls:get
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private))

Operations
  • GET /v1/containers/{container-id}/acl

Scope Types
  • project

Retrieve the ACL settings for a given container.

container_acls:delete
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private))

Operations
  • DELETE /v1/containers/{container-id}/acl

Scope Types
  • project

Delete ACL for a given container. No content is returned in the case of successful deletion.

container_acls:put_patch
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private))

Operations
  • PUT /v1/containers/{container-id}/acl

  • PATCH /v1/containers/{container-id}/acl

Scope Types
  • project

Create new or replaces existing ACL for a given container.

consumer:get
Default

True:%(enforce_new_defaults)s and (role:admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private) or rule:container_acl_read)

Operations
  • GET /v1/containers/{container-id}/consumers/{consumer-id}

Scope Types
  • project

DEPRECATED: show information for a specific consumer

container_consumers:get
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private) or rule:container_acl_read)

Operations
  • GET /v1/containers/{container-id}/consumers

Scope Types
  • project

List a containers consumers.

container_consumers:post
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private) or rule:container_acl_read)

Operations
  • POST /v1/containers/{container-id}/consumers

Scope Types
  • project

Creates a consumer.

container_consumers:delete
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private) or rule:container_acl_read)

Operations
  • DELETE /v1/containers/{container-id}/consumers

Scope Types
  • project

Deletes a consumer.

secret_consumers:get
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private) or rule:secret_acl_read)

Operations
  • GET /v1/secrets/{secret-id}/consumers

Scope Types
  • project

List consumers for a secret.

secret_consumers:post
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private) or rule:secret_acl_read)

Operations
  • POST /v1/secrets/{secrets-id}/consumers

Scope Types
  • project

Creates a consumer.

secret_consumers:delete
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private) or rule:secret_acl_read)

Operations
  • DELETE /v1/secrets/{secrets-id}/consumers

Scope Types
  • project

Deletes a consumer.

containers:post
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • POST /v1/containers

Scope Types
  • project

Creates a container.

containers:get
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • GET /v1/containers

Scope Types
  • project

Lists a projects containers.

container:get
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private) or rule:container_acl_read)

Operations
  • GET /v1/containers/{container-id}

Scope Types
  • project

Retrieves a single container.

container:delete
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private))

Operations
  • DELETE /v1/containers/{uuid}

Scope Types
  • project

Deletes a container.

container_secret:post
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private))

Operations
  • POST /v1/containers/{container-id}/secrets

Scope Types
  • project

Add a secret to an existing container.

container_secret:delete
Default

True:%(enforce_new_defaults)s and (rule:container_project_admin or (rule:container_project_member and rule:container_owner) or (rule:container_project_member and  rule:container_is_not_private))

Operations
  • DELETE /v1/containers/{container-id}/secrets/{secret-id}

Scope Types
  • project

Remove a secret from a container.

orders:get
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • GET /v1/orders

Scope Types
  • project

Gets list of all orders associated with a project.

orders:post
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • POST /v1/orders

Scope Types
  • project

Creates an order.

orders:put
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • PUT /v1/orders

Scope Types
  • project

Unsupported method for the orders API.

order:get
Default

True:%(enforce_new_defaults)s and rule:order_project_member

Operations
  • GET /v1/orders/{order-id}

Scope Types
  • project

Retrieves an orders metadata.

order:delete
Default

True:%(enforce_new_defaults)s and rule:order_project_member

Operations
  • DELETE /v1/orders/{order-id}

Scope Types
  • project

Deletes an order.

quotas:get
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/quotas

Scope Types
  • project

List quotas for the project the user belongs to.

project_quotas:get
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • GET /v1/project-quotas

  • GET /v1/project-quotas/{uuid}

Scope Types
  • project

List quotas for the specified project.

project_quotas:put
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • PUT /v1/project-quotas/{uuid}

Scope Types
  • project

Create or update the configured project quotas for the project with the specified UUID.

project_quotas:delete
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • DELETE /v1/quotas}

Scope Types
  • project

Delete the project quotas configuration for the project with the requested UUID.

secret_meta:get
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private) or rule:secret_acl_read)

Operations
  • GET /v1/secrets/{secret-id}/metadata

  • GET /v1/secrets/{secret-id}/metadata/{meta-key}

Scope Types
  • project

metadata/: Lists a secrets user-defined metadata. || metadata/{key}: Retrieves a secrets user-added metadata.

secret_meta:post
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • POST /v1/secrets/{secret-id}/metadata/{meta-key}

Scope Types
  • project

Adds a new key/value pair to the secrets user-defined metadata.

secret_meta:put
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • PUT /v1/secrets/{secret-id}/metadata

  • PUT /v1/secrets/{secret-id}/metadata/{meta-key}

Scope Types
  • project

metadata/: Sets the user-defined metadata for a secret || metadata/{key}: Updates an existing key/value pair in the secrets user-defined metadata.

secret_meta:delete
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • DELETE /v1/secrets/{secret-id}/metadata/{meta-key}

Scope Types
  • project

Delete secret user-defined metadata by key.

secret:decrypt
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private) or rule:secret_acl_read)

Operations
  • GET /v1/secrets/{uuid}/payload

Scope Types
  • project

Retrieve a secrets payload.

secret:get
Default

True:%(enforce_new_defaults)s and (role:admin or rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private) or rule:secret_acl_read)

Operations
  • GET /v1/secrets/{secret-id}

Scope Types
  • project

Retrieves a secrets metadata.

secret:put
Default

True:%(enforce_new_defaults)s and (rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • PUT /v1/secrets/{secret-id}

Scope Types
  • project

Add the payload to an existing metadata-only secret.

secret:delete
Default

True:%(enforce_new_defaults)s and (role:admin or rule:secret_project_admin or (rule:secret_project_member and rule:secret_owner) or (rule:secret_project_member and rule:secret_is_not_private))

Operations
  • DELETE /v1/secrets/{secret-id}

Scope Types
  • project

Delete a secret by uuid.

secrets:post
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • POST /v1/secrets

Scope Types
  • project

Creates a Secret entity.

secrets:get
Default

True:%(enforce_new_defaults)s and role:member

Operations
  • GET /v1/secrets

Scope Types
  • project

Lists a projects secrets.

secretstores:get
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/secret-stores

Scope Types
  • project

Get list of available secret store backends.

secretstores:get_global_default
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/secret-stores/global-default

Scope Types
  • project

Get a reference to the secret store that is used as default secret store backend for the deployment.

secretstores:get_preferred
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/secret-stores/preferred

Scope Types
  • project

Get a reference to the preferred secret store if assigned previously.

secretstore_preferred:post
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • POST /v1/secret-stores/{ss-id}/preferred

Scope Types
  • project

Set a secret store backend to be preferred store backend for their project.

secretstore_preferred:delete
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • DELETE /v1/secret-stores/{ss-id}/preferred

Scope Types
  • project

Remove preferred secret store backend setting for their project.

secretstore:get
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/secret-stores/{ss-id}

Scope Types
  • project

Get details of secret store by its ID.

transport_key:get
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/transport_keys/{key-id}}

Scope Types
  • project

Get a specific transport key.

transport_key:delete
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • DELETE /v1/transport_keys/{key-id}

Scope Types
  • project

Delete a specific transport key.

transport_keys:get
Default

True:%(enforce_new_defaults)s and role:reader

Operations
  • GET /v1/transport_keys

Scope Types
  • project

Get a list of all transport keys.

transport_keys:post
Default

True:%(enforce_new_defaults)s and role:admin

Operations
  • POST /v1/transport_keys

Scope Types
  • project

Create a new transport key.