Skip to main content

Who Has Access to Sentinels

Access to Standard Sentinels (symmetric key)

  • Users with the ROLE_USER role: Only users with the ROLE_USER role can access the sentinels.

  • Creator of the sentinel: A user who created the sentinel has access to its encryption key.

  • Users in associated clusters: Users who belong to a cluster linked to the sentinel also have access to the sentinel.

Access to Anonymous Sentinels (asymmetric key)

  • Users with the ROLE_USER role: Only users with the ROLE_USER role can access the anonymous sentinels.
  • Creator of the sentinel: A user who created the anonymous sentinel has access to its private key.
  • Users in associated clusters: Users who belong to a cluster linked to the sentinel have access to the sentinel and its private key.
  • Public access to the public key: The public key of an anonymous sentinel is accessible to everyone.

Example of Sentinel Access

Standard Sentinel

  1. Creation:
  • A ROLE_USER creates a sentinel by providing a list of clusters.
  1. Access:
  • The creator has access to the encryption key.
  • Users in the specified clusters also have access to the encryption key.

Anonymous Sentinel

  1. Creation:
  • A ROLE_USER creates an anonymous sentinel by providing a list of clusters.
  1. Access:
  • The creator has access to the private key.
  • Users in the specified clusters also have access to the private key.
  • The public key is accessible to everyone.