Skip to content

Commit d64dca8

Browse files
authored
Merge branch 'main' into rhidp-4862
2 parents 12c0ae4 + 8b0a876 commit d64dca8

File tree

2 files changed

+26
-4
lines changed

2 files changed

+26
-4
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You can define the following types of permissions in {product-short}:
88
* resource type
99
* basic
1010

11-
The distinction between the two permission types depend on whether a permission includes a defined resource type.
11+
The distinction between the two permission types depends on whether a permission includes a defined resource type.
1212

1313
You can define the resource type permission using either the associated resource type or the permission name as shown in the following example:
1414

@@ -181,6 +181,28 @@ Kubernetes permissions::
181181

182182
OCM permissions::
183183

184+
Basic OCM permissions only restrict access to the cluster view, but they do not prevent access to the Kubernetes clusters in the resource view. For more effective permissions, consider applying a conditional policy to restrict access to catalog entities that are of type `kubernetes-cluster`. Access restriction is dependent on the set of permissions granted to a role. For example, if the role had full permissions (`read`, `update`, and `delete`), then you must specify all its permissions in the `permissionMapping` field.
185+
186+
.Example permissionMapping definition
187+
[source,csv]
188+
----
189+
result: CONDITIONAL
190+
roleEntityRef: 'role:default/<YOUR_ROLE>'
191+
pluginId: catalog
192+
resourceType: catalog-entity
193+
permissionMapping:
194+
- read
195+
- update
196+
- delete
197+
conditions:
198+
not:
199+
rule: HAS_SPEC
200+
resourceType: catalog-entity
201+
params:
202+
key: type
203+
value: kubernetes-cluster
204+
----
205+
184206
[cols="15%,25%,15%,45%", frame="all", options="header"]
185207
|===
186208
|Name

modules/installation/proc-add-custom-app-config-file-ocp-operator.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,10 @@ image::rhdh/operator-install-2.png[]
7070
+
7171
[source, yaml]
7272
----
73-
apiVersion: v1
74-
kind: ConfigMap
73+
apiVersion: rhdh.redhat.com/v1alpha1
74+
kind: Backstage
7575
metadata:
76-
name: example
76+
name: developer-hub
7777
spec:
7878
application:
7979
appConfig:

0 commit comments

Comments
 (0)