@@ -13,13 +13,13 @@ authentication. You can find out how to generate one in our
1313In the following examples, all API keys will be represented as
1414` <PHYLUM_API_KEY> ` , so make sure to replace them with your generated key.
1515
16- Additionally, if the default [ policy] is not sufficient, a group can be passed
17- to evaluate all packages against the group's policy. To do this, just replace
18- ` <PHYLUM_GROUP> ` with the desired group name. The supplied API key ** must ** have
19- access to this group.
16+ Additionally, if the default policy is not sufficient, a group can be passed to
17+ evaluate all packages against the group's policy. To do this, just replace
18+ ` <PHYLUM_ORG> ` and ` < PHYLUM_GROUP>` with the desired org and group name. The
19+ supplied API key ** must ** have access to this group.
2020
21- If Phylum's default [ policy] is sufficient, you can remove all instances of
22- ` <PHYLUM_GROUP> ` .
21+ If Phylum's default [ policy] is sufficient, you can omit the username from the
22+ authentication details .
2323
2424[ API Keys documentation ] : ../knowledge_base/api-keys.md#generate-an-api-key
2525[ policy ] : ../knowledge_base/policy.md
@@ -72,10 +72,10 @@ global-credential-providers = ["cargo:token"]
7272Once the file-based ` cargo:token ` credential provider is configured, you can add
7373your authentication details to the [ ` .cargo/credentials.toml ` file] .
7474
75- The Phylum group and API key first need to be converted to Base64:
75+ The Phylum org, group, and API key first need to be converted to Base64:
7676
7777``` text
78- printf "<PHYLUM_GROUP>:<PHYLUM_API_KEY>" | base64
78+ printf "<PHYLUM_ORG>/< PHYLUM_GROUP>:<PHYLUM_API_KEY>" | base64
7979```
8080
8181> ⚠️ ** WARNING** ⚠️
0 commit comments