Search
Amazon Verified Permissions
This guide provides a conceptual overview of Verified Permissions and explains how to use it to define policies as permissions within your application.
This guide provides details about using the actions, data types, and API requests that can be made with Verified Permissions.
This documentation provides a detailed overview of the Cedar policy language for access control. This guide helps you understand how to define principals, actions, resource types, and conditions for your schema and policies.
This guide shares key considerations and criteria to consider when designing an authorization model for your application.