Authorization
Understanding PDaaS authorization with AWS IAM-style policies, groups, and permissions.
Overview
PDaaS uses an AWS IAM-inspired authorization system with:
- Policies - Define permissions (Allow/Deny actions on resources)
- Groups - Collections of users/service accounts with shared permissions
- Account Scoping - All permissions are scoped to specific accounts
Core Concepts
Policies
Policies define what can be done:
{
"Version": "2023-10-01",
"Statement": [
{
"Effect": "Allow",
"Action": ["accounts:GetAccount", "accounts:ListAccounts"],
"Resource": "*"
}
]
}
Groups
Groups define who gets which policies:
Administrators Group
├── Attached Policy: AdminAccess
├── Members:
│ ├── [email protected] (Production Account)
│ └── [email protected] (Production Account)
Permission Evaluation
- Explicit Deny - If any policy denies, request is denied
- Explicit Allow - If any policy allows and no denies, request is allowed
- Default Deny - If no policy allows, request is denied