Skip to content

Commit 0fde99f

Browse files
Address review comments
Signed-off-by: Markus Hentsch <[email protected]>
1 parent 65d72d4 commit 0fde99f

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

Standards/scs-03XX-v1-standard-roles.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,9 @@ track: IAM
77

88
## Introduction
99

10-
SCS aims to provide a standardized role model for RBAC roles across all supported OpenStack API services that applies sensible and consistent permission sets based on a set list of roles defined by a standard.
11-
It is closely guided by the OpenStack defaults.
10+
SCS aims to provide a standardized role model for Role-Based Access Control (RBAC) across all supported OpenStack API services.
11+
The goal of this standard is to define IaaS roles for SCS clouds with sensible and consistent permission sets.
12+
It is closely guided by the OpenStack defaults to achieve compatibility and interoperability.
1213

1314
## Terminology
1415

@@ -26,8 +27,9 @@ The following special terms are used throughout this standard document:
2627

2728
## Motivation
2829

29-
The permission settings of OpenStack RBAC roles are configured in service-specific deployment configuration files (usually the respective "`policy.yaml`") in a rather static way and have to be carefully managed.
30-
In contrast to many of OpenStack's IAM and IaaS resources, these settings cannot be changed via its API at runtime.
30+
The permission settings of OpenStack RBAC roles are preconfigured in the OpenStack API implementations and can be adjusted individually in service-specific deployment configuration files (usually the respective "`policy.yaml`") optionally.
31+
In contrast to many of OpenStack's IAM and IaaS resources however, these settings cannot be changed via its API at runtime, only via configuration files.
32+
Changing these settings can have a wide range of implications and require careful testing and maintenance.
3133
For this reason it is important to have a secure and sensible default configuration in SCS clouds that is both intuitive and flexible enough to cover all necessary use cases of permission models desired by CSPs and customers.
3234

3335
## Design Considerations

0 commit comments

Comments
 (0)