Put ACL on Secret Scope
Arguments
- scope
Name of the scope to apply permissions.
- principal
Principal to which the permission is applied
- permission
Permission level applied to the principal. One of
READ,WRITE,MANAGE.- host
Databricks workspace URL, defaults to calling
db_host().- token
Databricks workspace token, defaults to calling
db_token().- perform_request
If
TRUE(default) the request is performed, ifFALSEthe httr2 request is returned without being performed.
Details
Create or overwrite the ACL associated with the given principal (user or group) on the specified scope point. In general, a user or group will use the most powerful permission available to them, and permissions are ordered as follows:
MANAGE- Allowed to change ACLs, and read and write to this secret scope.WRITE- Allowed to read and write to this secret scope.READ- Allowed to read this secret scope and list what secrets are available.
You must have the MANAGE permission to invoke this API.
The principal is a user or group name corresponding to an existing Databricks principal to be granted or revoked access.
Throws
RESOURCE_DOES_NOT_EXISTif no such secret scope exists.Throws
RESOURCE_ALREADY_EXISTSif a permission for the principal already exists.Throws
INVALID_PARAMETER_VALUEif the permission is invalid.Throws
PERMISSION_DENIEDif you do not have permission to make this API call.
