You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Standards/scs-03XX-v1-standard-roles.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,9 @@ track: IAM
7
7
8
8
## Introduction
9
9
10
-
SCS aims to provide a standardized role model for RBAC roles across all supported OpenStack API services that applies sensible and consistent permission sets based on a set list of roles defined by a standard.
11
-
It is closely guided by the OpenStack defaults.
10
+
SCS aims to provide a standardized role model for Role-Based Access Control (RBAC) across all supported OpenStack API services.
11
+
The goal of this standard is to define IaaS roles for SCS clouds with sensible and consistent permission sets.
12
+
It is closely guided by the OpenStack defaults to achieve compatibility and interoperability.
12
13
13
14
## Terminology
14
15
@@ -26,8 +27,9 @@ The following special terms are used throughout this standard document:
26
27
27
28
## Motivation
28
29
29
-
The permission settings of OpenStack RBAC roles are configured in service-specific deployment configuration files (usually the respective "`policy.yaml`") in a rather static way and have to be carefully managed.
30
-
In contrast to many of OpenStack's IAM and IaaS resources, these settings cannot be changed via its API at runtime.
30
+
The permission settings of OpenStack RBAC roles are preconfigured in the OpenStack API implementations and can be adjusted individually in service-specific deployment configuration files (usually the respective "`policy.yaml`") optionally.
31
+
In contrast to many of OpenStack's IAM and IaaS resources however, these settings cannot be changed via its API at runtime, only via configuration files.
32
+
Changing these settings can have a wide range of implications and require careful testing and maintenance.
31
33
For this reason it is important to have a secure and sensible default configuration in SCS clouds that is both intuitive and flexible enough to cover all necessary use cases of permission models desired by CSPs and customers.
0 commit comments