Skip to content

Commit 4837867

Browse files
authored
Merge pull request #332 from authzed/fix-grammar-part-3
more grammar fixes
2 parents ceac437 + 7f19282 commit 4837867

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

pages/authzed/concepts/authzed-materialize.mdx

+5-3
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,12 @@ Much like the concept of a materialized view in relational databases, AuthZed Ma
88
By creating a materialized view of your permissions in a relational database, you can efficiently sort, search, and filter massive lists of authorized objects while leveraging the authorization computation capabilities of SpiceDB.
99

1010
<Callout type="info">
11-
AuthZed Materialize is available to users of AuthZed Dedicated as part of an early access program.
11+
AuthZed Materialize is available to users of AuthZed [Dedicated] as part of an early access program.
1212
Don't hesitate to get in touch with your AuthZed account team if you would like to participate.
1313
</Callout>
1414

15+
[Dedicated]: ../guides/picking-a-product#dedicated
16+
1517
## What Is AuthZed Materialize?
1618

1719
Materialize streams computed permission updates to a client.
@@ -30,14 +32,14 @@ Those scenarios include:
3032
1. Paginating through a list of authorized objects without sorting or filtering ([LookupResources] supports cursor-based pagination, but the list of objects is returned in a non-deterministic order)
3133
2. Listing a small set (in the realm of thousands) of ordered or filtered objects.
3234

33-
If you do make a [LookupResources] or [LookupSubjects] request with a significant computational cost, you can expect the request to be slow and you can expect the request to use a large number of system resources, leading to slower response times for other queries.
35+
If you do make a [LookupResources] or [LookupSubjects] request with a significant computational cost, you can expect the request to be slow and to use a large number of system resources, leading to slower response times for other queries.
3436

3537
## Current Limitations
3638

3739
- [Caveats](https://authzed.com/docs/spicedb/concepts/caveats) are not supported on the path of permissions computed by Materialize
3840
- [Wildcard](https://authzed.com/docs/spicedb/concepts/schema\#wildcards) subject types are not supported on the path of permissions computed by Materialize
3941

40-
You can still use both Caveats and Wildcards so long they are not part of the path to the permissions you've asked Materialize to query
42+
You can still use both Caveats and Wildcards, so long they are not part of the path to the permissions you've asked Materialize to query.
4143

4244
## Client SDK
4345

pages/authzed/concepts/security-embargo.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can find a listing of public vulnerabilities for SpiceDB on [GitHub], [NVD],
2222
A security embargo program is a defined process under which security issues are privately reported, analyzed for applicability, notice is given, and a resolution is created and distributed.
2323
The issue is only made public once those affected in the embargo program have enough time to address the issue or have accepted the risks.
2424

25-
Security embargos an industry best practice for ensuring that there are not critical software deployments with well documentated exploitation instructions.
25+
Security embargos are an industry best practice for ensuring that there are not critical software deployments with well documentated exploitation instructions.
2626

2727
## Reporting a security issue
2828

0 commit comments

Comments
 (0)