diff --git a/docs/content/best-practices/adoption-patterns.mdx b/docs/content/best-practices/adoption-patterns.mdx index d7f8b713b2..c0e761b458 100644 --- a/docs/content/best-practices/adoption-patterns.mdx +++ b/docs/content/best-practices/adoption-patterns.mdx @@ -12,7 +12,13 @@ import { # Adoption Patterns -This document outlines key implementation patterns for adopting in your organization. +In general, when adopting , you need to deal with three main challenges: + + - Define an authorization model that reflects your business requirements. + - Implement a data pipeline that keeps the data in up to date. + - Integrate into your applications using the APIs or SDKs. + +This document outlines a few patterns for addressing these issues when implementing in your organization. ## Starting with coarse-grained access control @@ -155,7 +161,7 @@ Some companies decide to wrap in a single service. - They only need to provide configuration data like Store ID and Model ID in a single service. -On the other hand, adding another service increases latency, adds additional complexity and would make the teams less likely to find help from existing public OpenFGA documentation and resources. +On the other hand, adding another service increases latency, adds additional complexity and would make the teams less likely to find help from existing public documentation and resources. ## Shadowing the API @@ -180,13 +186,8 @@ This pattern is particularly useful for critical systems where authorization err ## Related Sections