Skip to content

Commit f4821bd

Browse files
Clarify admin and edit roles
Co-authored-by: Camila Macedo <[email protected]>
1 parent 9f75853 commit f4821bd

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/concepts/how-to-grant-api-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ Administrators can define standard roles to control access to the API resources
3535

3636
### Default Roles
3737

38-
- **View ClusterRole**: Grants read-only access to all custom resource objects of specified API resources across the cluster.
39-
- **Edit ClusterRole**: Allows modifying all custom resource objects within the cluster.
40-
- **Admin ClusterRole**: Provides full permissions (create, update, delete) over all custom resource objects for the specified API resources across the cluster.
38+
- **View ClusterRole**: Grants read-only access to all custom resource objects of specified API resources across the cluster. This role is intended for users who need visibility into the resources without any permissions to modify them. It’s ideal for monitoring purposes and limited access viewing.
39+
- **Edit ClusterRole**: Allows users to modify all custom resource objects within the cluster. This role enables users to create, update, and delete resources, making it suitable for team members who need to manage resources but should not control RBAC or manage permissions for others.
40+
- **Admin ClusterRole**: Provides full permissions (create, update, delete) over all custom resource objects for the specified API resources across the cluster. In addition to resource management, it grants users the ability to modify roles and bindings within the cluster, allowing them to delegate specific permissions to other users or groups as needed.
4141

4242
### Example: Defining a Custom "View" ClusterRole
4343

0 commit comments

Comments
 (0)