Amazon Verified Permissions User Guide
Introduces you to Amazon Verified Permissions. Explains how to create and manage
authorization policies written in the Cedar policy language. Also explains how to
create a schema that describes your application's authorization
environment. The schema can include the principals, resources, and
actions that are part of your application's operational flow. Finally,
it explains how to use Verified Permissions from within your application to authorize
your users' requests.