You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: pages/authzed/concepts/authzed-materialize.mdx
+5-3
Original file line number
Diff line number
Diff line change
@@ -8,10 +8,12 @@ Much like the concept of a materialized view in relational databases, AuthZed Ma
8
8
By creating a materialized view of your permissions in a relational database, you can efficiently sort, search, and filter massive lists of authorized objects while leveraging the authorization computation capabilities of SpiceDB.
9
9
10
10
<Callouttype="info">
11
-
AuthZed Materialize is available to users of AuthZed Dedicated as part of an early access program.
11
+
AuthZed Materialize is available to users of AuthZed [Dedicated] as part of an early access program.
12
12
Don't hesitate to get in touch with your AuthZed account team if you would like to participate.
Materialize streams computed permission updates to a client.
@@ -30,14 +32,14 @@ Those scenarios include:
30
32
1. Paginating through a list of authorized objects without sorting or filtering ([LookupResources] supports cursor-based pagination, but the list of objects is returned in a non-deterministic order)
31
33
2. Listing a small set (in the realm of thousands) of ordered or filtered objects.
32
34
33
-
If you do make a [LookupResources] or [LookupSubjects] request with a significant computational cost, you can expect the request to be slow and you can expect the request to use a large number of system resources, leading to slower response times for other queries.
35
+
If you do make a [LookupResources] or [LookupSubjects] request with a significant computational cost, you can expect the request to be slow and to use a large number of system resources, leading to slower response times for other queries.
34
36
35
37
## Current Limitations
36
38
37
39
-[Caveats](https://authzed.com/docs/spicedb/concepts/caveats) are not supported on the path of permissions computed by Materialize
38
40
-[Wildcard](https://authzed.com/docs/spicedb/concepts/schema\#wildcards) subject types are not supported on the path of permissions computed by Materialize
39
41
40
-
You can still use both Caveats and Wildcards so long they are not part of the path to the permissions you've asked Materialize to query
42
+
You can still use both Caveats and Wildcards, so long they are not part of the path to the permissions you've asked Materialize to query.
Copy file name to clipboardexpand all lines: pages/authzed/concepts/security-embargo.mdx
+1-1
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ You can find a listing of public vulnerabilities for SpiceDB on [GitHub], [NVD],
22
22
A security embargo program is a defined process under which security issues are privately reported, analyzed for applicability, notice is given, and a resolution is created and distributed.
23
23
The issue is only made public once those affected in the embargo program have enough time to address the issue or have accepted the risks.
24
24
25
-
Security embargos an industry best practice for ensuring that there are not critical software deployments with well documentated exploitation instructions.
25
+
Security embargos are an industry best practice for ensuring that there are not critical software deployments with well documentated exploitation instructions.
0 commit comments