Skip to content

Commit 14eda2a

Browse files
authored
Reword security docs
- Use Trino cluster instead of backend
1 parent 18bbb13 commit 14eda2a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Set the `privilegesField` to retrieve privileges from an OAuth claim.
6868

6969
- For OAuth Trino Gateway uses `oidc/callback` where as Trino uses `oauth2` path
7070
- Trino Gateway should have its own client id
71-
- All the Trino backend clusters should have a single client id.
71+
- All the Trino clusters should have a single client id.
7272
- Trino Gateway needs to pass thorugh the Trino Oauth2 requests only to one of the clusters.
7373
- One way to handle it is to set a special rule like below:
7474
```yaml
@@ -80,7 +80,7 @@ Set the `privilegesField` to retrieve privileges from an OAuth claim.
8080
- "result.put(\"routingGroup\", \"oauth2-handler\")"
8181
```
8282
- That also means you need to have a cluster with that routing group.
83-
- It's ok to replicate an existing cluster backend record with a different name for that purpose.
83+
- It's ok to replicate an existing Trino cluster record with a different name for that purpose.
8484

8585
### Form/Basic authentication
8686

@@ -129,11 +129,11 @@ authentication:
129129
Trino Gateway supports the following roles in regex string format:
130130

131131
- admin : Allows access to the Editor tab, which can be used to configure the
132-
backends
132+
clusters
133133

134134
- user : Allows access to the rest of the website
135135

136-
- api : Allows access to rest apis to configure the backends
136+
- api : Allows access to rest apis to configure the clusters
137137

138138
Users with attributes next to the role will be giving those privileges the
139139
users. You can use the preset users defined in the yaml file.

0 commit comments

Comments
 (0)