@@ -169,15 +169,15 @@ security requirements.
169169JWT claims from your identity provider become available in policies with a
170170`claim_` prefix. You can use these claims in two ways :
171171
172- # ## On the principal entity
172+ ** On the principal entity:**
173173
174174` ` ` text
175175permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
176176 principal.claim_name == "John Doe"
177177};
178178` ` `
179179
180- # ## In the context
180+ ** In the context:**
181181
182182` ` ` text
183183permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
@@ -193,15 +193,15 @@ readable.
193193Tool arguments become available in policies with an `arg_` prefix. This lets you
194194create policies based on the specific parameters of requests :
195195
196- # ## On the resource entity
196+ ** On the resource entity:**
197197
198198` ` ` text
199199permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
200200 resource.arg_location == "New York" || resource.arg_location == "London"
201201};
202202` ` `
203203
204- # ## In the context
204+ ** In the context:**
205205
206206` ` ` text
207207permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
@@ -407,5 +407,3 @@ When policies don't work as expected, follow this systematic approach:
407407 [Authentication and authorization framework](./auth-framework.md)
408408- For detailed Cedar policy syntax, see
409409 [Cedar documentation](https://docs.cedarpolicy.com/)
410-
411- <!-- markdownlint-disable-file MD024 -->
0 commit comments