You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/docs/get-started/fundamentals/core/build-policies.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,14 +64,13 @@ PPL allows administrators to express authorization policy in a high-level, decla
64
64
65
65
You can think of it as coded instructions to tell Pomerium how authorization decisions are made for capturing all niche and edge-case scenarios. It's as flexible as you want it to be!
66
66
67
-
68
-
69
67
### How does PPL work?
70
68
71
69
PPL is made up of **Rules**, **Actions**, **Logical Operators**, **Criteria**, and **Matchers**.
72
70
73
71
Below is a simple policy example in PPL format that allows access for the email [email protected]. The following sections will break down each of these components in more detail.
0 commit comments