# Sandbox C
This sandbox builds on `sandbox_a` and `sandbox_b` to demonstrate the use of policy templates.
## Entity store
Our store has three `User`s:
- `alice`
- `bob` (with the attribute `department` set to `research`)
- `jane`
One `Album`:
- `jane`
And two `Photo`s, both in the `Album::"jane"`:
- `VacationPhoto94.jpg`
Let's see if `alice` can view `VacationPhoto94.jpg`:
```shell
cargo run authorize \
--principal 'User::"alice"' \
--action 'Action::"view"' \
--resource 'Photo::"VacationPhoto94.jpg"' \
--policies policies.cedar \
--entities entities.json
```
We should get `DENY`, as there is no policy that allows this.
## Linking a template
Our policy store contains a policy template that we can use to grant `alice` access:
```cedar
@id("AccessVacation")
permit(
principal in ?principal,
action == Action::"view",
resource == Photo::"VacationPhoto94.jpg"
);
```
This looks like a regular policy, but it has `?principal` instead of a concrete Entity UID on the left hand side of `==`.
`?principal` is a *Slot*, which can be filled in later.
Let's link this template to give `alice` access:
```shell
cargo run link \
--policies policies.cedar \
--template-linked ./linked \
--template-id "AccessVacation" \
--new-id "AliceAccess" \
--arguments '{ "?principal" : "User::\"alice\"" }'
```
This will fill the Slot `?principal` with `User::\"alice\"` in the template with ID "AccessVacation".
This template-linked policiy will have the ID "AliceAccess".
It will save this template-linked policy in the file `./linked`.
We can re-run the request with our linked file:
```shell
cargo run authorize \
--principal 'User::"alice"' \
--action 'Action::"view"' \
--resource 'Photo::"VacationPhoto94.jpg"' \
--policies policies.cedar \
--entities entities.json \
--template-linked ./linked
```
And we should now get `ALLOW`.
Let's also give `bob` access:
```shell
cargo run link \
--policies policies.cedar \
--template-linked ./linked \
--template-id "AccessVacation" \
--new-id "BobAccess" \
--arguments '{ "?principal" : "User::\"bob\"" }'
```
And now both `bob` and `alice` have access.
## Updating a template
Templates can be updated, and past policies linked to that template will reflect the new template.
Let's take our previous template, and update it to also have an ABAC rule.
Edit the template to add a when clause so it looks like the following:
```cedar
@id("AccessVacation")
permit(
principal in ?principal,
action == Action::"view",
resource == Photo::"VacationPhoto94.jpg"
) when {
principal has department && principal.department == "research"
};
```
Now we can re-run our requests:
```shell
cargo run authorize \
--principal 'User::"bob"' \
--action 'Action::"view"' \
--resource 'Photo::"VacationPhoto94.jpg"' \
--policies policies_edited.cedar \
--entities entities.json \
--template-linked ./linked
```
Bob should still have access, as his entity has the attribute set.
```shell
cargo run authorize \
--principal 'User::"alice"' \
--action 'Action::"view"' \
--resource 'Photo::"VacationPhoto94.jpg"' \
--policies policies_edited.cedar \
--entities entities.json \
--template-linked ./linked
```
But Alice should now be denied.
## What's next?
Try even more authorization requests. Change the data in the policies or entities
files and see how Cedar responds. Maybe even write your own entities and
policies.