Ignite Auth and Access
Last validated: 2026-05-20
Ignite uses token-based tenant identity on public surfaces
Access Planes
Public User Plane
Applies to:
- ComputeService
- BuildService
- ModelService
- SecretService
Identity model:
- Bearer token validated through gateway/auth chain
- Tenant org context propagated via trusted metadata (
x-organization-name) - Method-level scope checks enforced via proto auth annotations and runtime middleware
Organization Context Rules
- Runtime treats organization context as authoritative metadata, not user-editable payload fields.
- Cross-org reads/writes are blocked by tenant scoping in service logic.
- Secret paths are org-scoped, preventing cross-tenant secret access.
CLI Auth and Config Precedence
CLI resolves auth and endpoint values from (highest to lowest):
- Explicit command flags
- Shared Dodil token env (
DODIL_TOKEN) and Ignite env vars - Config files (
~/.config/dodil/config.yamlin plugin flow, plus CLI-local config paths)
Scope Model (High Level)
Representative scopes used across RPCs:
DeployApp,GetApp,ListApps,ListAppVersions,RollbackAppInvokeApp,GetExecutionCreateBuild,GetBuild,ListBuilds,CancelBuild,SaveBuildSecretsCreateSecret,GetSecret,ListSecrets,DeleteSecret
Interpretation:
- API call success requires both valid identity and matching method scope.
- Scope policy details are environment-managed IAM concerns.