Skip to content

Commit 8b47ac8

Browse files
authored
Merge branch 'main' into feat/describe-mailinglists
2 parents 7fb6ca8 + 0ac0618 commit 8b47ac8

File tree

4 files changed

+79
-0
lines changed

4 files changed

+79
-0
lines changed

community/governance/index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Governance of the SCS Community
2+
3+
The SCS Community is governed by the [SCS Project Board](/community/governance/project-board). The _Project Board_ is elected on a yearly basis.
4+
The governance of the community is described in the procedural standard [SCS-0005](https://docs.scs.community/standards/global/scs-0005).
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
# The SCS Project Board
2+
3+
The governance of the community is described in the procedural standard [SCS-0005](https://docs.scs.community/standards/global/scs-0005).
4+
5+
## Project Board Term 2025
6+
7+
For the term 2025 the project board consists of:
8+
9+
Spokesperson: Felix Kronlage-Dammers, @fkr
10+
11+
| Name, Firstname | Github Handle | E-Mail | Remark |
12+
| ----------------------- | ---------------------------------------------- | ------------------------------------------------------------ |---------------------------------
13+
| Berendt, Christian | [@berendt](https://github.com/berendt) | [[email protected]](mailto:[email protected]) | Elected by Community |
14+
| Feder, Matej | [@matofeder](https://github.com/matofeder) | [[email protected]](mailto:[email protected])| Elected by Community |
15+
| Garloff, Kurt | [@garloff](https://github.com/garloff) | [[email protected]](mailto:[email protected]) | Elected by Community |
16+
| Kronlage-Dammers, Felix | [@fkr](https://github.com/fkr) | [[email protected]](mailto:[email protected]) | Represents Forum SCS-Standards |
17+
| Schoone, Jan | [@jschoone](https://github.com/jschoone) | [[email protected]](mailto:[email protected]) | Elected by Community |

docs/05-iam/iaas-roles.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
# IaaS Roles
2+
3+
An SCS-compliant cloud offers the following roles on the Infrastructure as a Service (IaaS) layer:
4+
5+
| Role | Scope | Description |
6+
|---|---|---|
7+
| reader | All OpenStack APIs | Role with read-only access within authentication scope. |
8+
| member | All OpenStack APIs | Role with read-write access within authentication scope. |
9+
| manager | Identity API | Role with self-service capabilites for the Identity API in domain scope. |
10+
| admin | All OpenStack APIs | Most privileged role, reserved for CSP personnel, to administer the OpenStack cloud |
11+
12+
:::info Role Inheritance
13+
14+
The OpenStack Identity API implements automatic role inheritance between admin, manager, member and reader roles where a role with higher privileges inherits all lesser roles automatically.
15+
16+
This means:
17+
18+
- `admin` inherits `manager`, `member` and `reader`
19+
- `manager` inherits `member` and `reader`
20+
- `member` inherits `reader`
21+
22+
:::
23+
24+
## Role Assignment
25+
26+
### Scopes & Targets
27+
28+
Roles can be assigned in different scopes and either to users or groups.
29+
This leads to the following role assignment matrix:
30+
31+
| | User | Group |
32+
|---|---|---|
33+
| Project | single user, permissions in project | all users of group, permissions in project |
34+
| Domain | single user, permissions in domain | all users of group, permissions in domain |
35+
| System | single user, permissions in whole cloud | all users of group, permissions in whole cloud |
36+
37+
(rows are the scopes and columns are the role assignment target entities)
38+
39+
### Assignment Procedure
40+
41+
Roles are assigned to users or groups by administrative personnel.
42+
In most cases, this is either:
43+
44+
- a cloud operator with the admin role, belonging to the provider
45+
- a domain manager with the manager role in domain scope, belonging to the provider or a tenant
46+
47+
A domain manager can only assign and revoke roles within their own domain and is restricted to a specific subset of available roles to prevent privilege escalation.

sidebarsCommunity.js

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,17 @@ const sidebars = {
55
community: [
66
'index',
77
'mission-statement',
8+
{
9+
type: 'category',
10+
link: {
11+
type: 'doc',
12+
id: 'governance/index'
13+
},
14+
label: 'Governance',
15+
items: [
16+
'governance/project-board'
17+
]
18+
},
819
'license-considerations',
920
{
1021
type: 'category',

0 commit comments

Comments
 (0)