Skip to content

Commit c59be8a

Browse files
committed
Add Preview status
1 parent f058236 commit c59be8a

File tree

3 files changed

+16
-0
lines changed

3 files changed

+16
-0
lines changed

src/current/v25.4/cockroachdb-feature-availability.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,14 @@ The SQL built-in function [workload_index_recs]({% link {{ page.version.version
9595

9696
[Triggers]({% link {{ page.version.version }}/triggers.md %}) are in Preview. A trigger executes a function when one or more specified SQL operations is performed on a table. Triggers respond to data changes by adding logic within the database, rather than in an application. They can be used to modify data before it is inserted, maintain data consistency across rows or tables, or record an update to a row.
9797

98+
### JWT authorization
99+
100+
[JWT authorization]({% link {{ page.version.version }}/jwt-authorization.md %}) allows CockroachDB to automatically assign roles to users based on group claims in their JWT tokens. When a client connects using a JWT token, the cluster extracts group information and maps each group to a corresponding cluster role, simplifying access control for organizations using identity providers.
101+
102+
### OIDC authorization for DB Console
103+
104+
[OIDC authorization for DB Console]({% link {{ page.version.version }}/oidc-authorization.md %}) allows CockroachDB to automatically assign roles to users based on group claims when they log into the DB Console via OIDC. The cluster extracts group information from ID tokens or access tokens and maps each group to a corresponding cluster role, streamlining access management for DB Console users.
105+
98106
### Admission control for ingesting snapshots
99107

100108
The [cluster setting]({% link {{ page.version.version }}/cluster-settings.md %}) `kvadmission.store.snapshot_ingest_bandwidth_control.enabled` is in Preview. When configured, it limits the disk impact of ingesting snapshots on a node.

src/current/v25.4/jwt-authorization.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ toc: true
55
docs_area: manage
66
---
77

8+
{{site.data.alerts.callout_info}}
9+
{% include feature-phases/preview.md %}
10+
{{site.data.alerts.end}}
11+
812
If you manage users through an identity provider (IdP) that supports JSON Web Tokens (JWT), you can configure CockroachDB to automatically assign [roles]({% link {{ page.version.version }}/security-reference/authorization.md %}) to users based on group claims in their JWT tokens, simplifying access control.
913

1014
If JWT authorization is enabled:

src/current/v25.4/oidc-authorization.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ toc: true
55
docs_area: manage
66
---
77

8+
{{site.data.alerts.callout_info}}
9+
{% include feature-phases/preview.md %}
10+
{{site.data.alerts.end}}
11+
812
If you manage users through an identity provider (IdP) that supports OpenID Connect (OIDC), you can configure CockroachDB to automatically assign [roles]({% link {{ page.version.version }}/security-reference/authorization.md %}) to users based on group claims when they log into the DB Console, simplifying access control.
913

1014
If OIDC authorization is enabled:

0 commit comments

Comments
 (0)