Skip to content

Commit b022c3b

Browse files
pabel-rhjmagak
andauthored
Update modules/authorization/ref-rbac-permission-policies.adoc
Co-authored-by: jmagak <[email protected]>
1 parent ef5a590 commit b022c3b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ Kubernetes permissions::
181181

182182
OCM permissions::
183183

184-
Basic OCM permissions only restrict access to the cluster view but they do not prevent access to the Kubernetes clusters in the resource view. For more effective permissions, consider applying a conditional policy to restrict access to catalog entities that are of type `kubernetes-cluster`. Access restriction is dependent on the set of permissions granted to a role. For example, if the role had full permissions (`read`, `update`, and `delete`), then you must specify all its permissions in the `permissionMapping` field.
184+
Basic OCM permissions only restrict access to the cluster view, but they do not prevent access to the Kubernetes clusters in the resource view. For more effective permissions, consider applying a conditional policy to restrict access to catalog entities that are of type `kubernetes-cluster`. Access restriction is dependent on the set of permissions granted to a role. For example, if the role had full permissions (`read`, `update`, and `delete`), then you must specify all its permissions in the `permissionMapping` field.
185185

186186
.Example permissionMapping definition
187187
[source,csv]

0 commit comments

Comments
 (0)