Put ACL on Secret Scope
Arguments
- scope
Name of the scope to apply permissions.
- principal
Principal to which the permission is applied
- permission
Permission level applied to the principal. One of
READ,WRITE,MANAGE.- host
Databricks workspace URL, defaults to calling
db_host().- token
Databricks workspace token, defaults to calling
db_token().- perform_request
If
TRUE(default) the request is performed, ifFALSEthe httr2 request is returned without being performed.
Value
If perform_request = TRUE, returns endpoint-specific API output. If FALSE, returns an httr2_request.
Details
Create or overwrite the ACL associated with the given principal (user or group) on the specified scope point. In general, a user or group will use the most powerful permission available to them, and permissions are ordered as follows:
MANAGE- Allowed to change ACLs, and read and write to this secret scope.WRITE- Allowed to read and write to this secret scope.READ- Allowed to read this secret scope and list what secrets are available.
You must have the MANAGE permission to invoke this API.
The principal is a user or group name corresponding to an existing Databricks principal to be granted or revoked access.
Throws
RESOURCE_DOES_NOT_EXISTif no such secret scope exists.Throws
RESOURCE_ALREADY_EXISTSif a permission for the principal already exists.Throws
INVALID_PARAMETER_VALUEif the permission is invalid.Throws
PERMISSION_DENIEDif you do not have permission to make this API call.
