@@ -68,7 +68,7 @@ Set the `privilegesField` to retrieve privileges from an OAuth claim.
6868
6969- For OAuth Trino Gateway uses `oidc/callback` where as Trino uses `oauth2` path
7070- Trino Gateway should have its own client id
71- - All the Trino backend clusters should have a single client id.
71+ - All the Trino clusters should have a single client id.
7272- Trino Gateway needs to pass thorugh the Trino Oauth2 requests only to one of the clusters.
7373- One way to handle it is to set a special rule like below :
7474` ` ` yaml
@@ -80,7 +80,7 @@ Set the `privilegesField` to retrieve privileges from an OAuth claim.
8080 - "result.put(\" routingGroup\" , \" oauth2-handler\" )"
8181` ` `
8282- That also means you need to have a cluster with that routing group.
83- - It's ok to replicate an existing cluster backend record with a different name for that purpose.
83+ - It's ok to replicate an existing Trino cluster record with a different name for that purpose.
8484
8585# ## Form/Basic authentication
8686
@@ -129,11 +129,11 @@ authentication:
129129Trino Gateway supports the following roles in regex string format :
130130
131131- admin : Allows access to the Editor tab, which can be used to configure the
132- backends
132+ clusters
133133
134134- user : Allows access to the rest of the website
135135
136- - api : Allows access to rest apis to configure the backends
136+ - api : Allows access to rest apis to configure the clusters
137137
138138Users with attributes next to the role will be giving those privileges the
139139users. You can use the preset users defined in the yaml file.
0 commit comments