Skip to content

Commit 6bdf39c

Browse files
author
GitHub Actions
committed
Update Orchestrator plugin permissions
1 parent 40032c6 commit 6bdf39c

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

modules/orchestrator/proc-managing-orchestrator-plugin-permissions-using-rbac-policies.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ p, role:default/workflowAdmin, orchestrator.instanceAdminView, read, allow
4646
# Assign users to the roles
4747
g, user:default/example_user, role:default/workflowUser
4848
----
49-
. In your {product-very-short} `{my-app-config-file}` file, enable permissions by adding the `orchestrator` plugin to the `rbac` section and setting `policyFileReload` to true.
49+
. In your {product-very-short} `{my-app-config-file}` file, enable permissions by adding the `orchestrator` plugin to the `rbac` section and setting `policyFileReload` to `true`.
5050
+
5151
[source,yaml,subs="+attributes,+quotes"]
5252
----

modules/orchestrator/ref-orchestrator-plugin-permissions.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,7 @@
33
[id="ref-orchestrator-plugin-permissions_{context}"]
44
= Orchestrator plugin permissions
55

6-
The Orchestrator plugin uses the {product} permission mechanism and the Role-Based Access Control (RBAC) plugin to restrict access to backend endpoints.
7-
Orchestrator supports decoupling visibility (read) from running (update) using specific workflow IDs instead of generic permissions.
6+
The Orchestrator plugin uses the {product} permission mechanism and the Role-Based Access Control (RBAC) plugin to restrict access to backend endpoints. Orchestrator supports decoupling visibility (read) from running (update) using specific workflow IDs instead of generic permissions.
87

98
[cols="20%,15%,15,50%", frame="all", options="header"]
109
|===

0 commit comments

Comments
 (0)