Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
48 changes: 24 additions & 24 deletions modules/authorization/ref-rbac-permission-policies.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -46,42 +46,42 @@ Catalog permissions::
|`catalog.entity.read`
|`catalog-entity`
|`read`
|Allows user or role to read from the catalog
|Allows a user or role to read from the catalog

|`catalog.entity.create`
|
|`create`
|Allows user or role to create catalog entities, including registering an existing component in the catalog
|Allows a user or role to create catalog entities, including registering an existing component in the catalog

|`catalog.entity.refresh`
|`catalog-entity`
|`update`
|Allows user or role to refresh a single or multiple entities from the catalog
|Allows a user or role to refresh a single or multiple entities from the catalog

|`catalog.entity.delete`
|`catalog-entity`
|`delete`
|Allows user or role to delete a single or multiple entities from the catalog
|Allows a user or role to delete a single or multiple entities from the catalog

|`catalog.location.read`
|
|`read`
|Allows user or role to read a single or multiple locations from the catalog
|Allows a user or role to read a single or multiple locations from the catalog

|`catalog.location.create`
|
|`create`
|Allows user or role to create locations within the catalog
|Allows a user or role to create locations within the catalog

|`catalog.location.delete`
|
|`delete`
|Allows user or role to delete locations from the catalog
|Allows a user or role to delete locations from the catalog
|===

Bulk import permissions::
Bulk import permission::

.Bulk import permissions
.Bulk import permission
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
|Name
Expand All @@ -92,7 +92,7 @@ Bulk import permissions::
|`bulk.import`
|`bulk-import`
|`use`
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests.
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests

|===

Expand All @@ -114,27 +114,27 @@ Scaffolder permissions::
|`scaffolder.template.parameter.read`
|`scaffolder-template`
|`read`
|Allows user or role to read a single or multiple one parameters from a template
|Allows a user or role to read a single or multiple one parameters from a template

|`scaffolder.template.step.read`
|`scaffolder-template`
|`read`
|Allows user or role to read a single or multiple steps from a template
|Allows a user or role to read a single or multiple steps from a template

|`scaffolder.task.create`
|
|`create`
|Allows the user or role to trigger software templates which create new scaffolder tasks
|Allows a user or role to trigger software templates which create new scaffolder tasks

|`scaffolder.task.cancel`
|
|`use`
|Allows the user or role to cancel currently running scaffolder tasks
|Allows a user or role to cancel currently running scaffolder tasks

|`scaffolder.task.read`
|
|`read`
|Allows user or role to read all scaffolder tasks and their associated events and logs
|Allows a user or role to read all scaffolder tasks and their associated events and logs
|===

RBAC permissions::
Expand All @@ -150,22 +150,22 @@ RBAC permissions::
|`policy.entity.read`
|`policy-entity`
|`read`
|Allows user or role to read permission policies and roles
|Allows a user or role to read permission policies and roles

|`policy.entity.create`
|`policy-entity`
|`create`
|Allows user or role to create a single or multiple permission policies and roles
|Allows a user or role to create a single or multiple permission policies and roles

|`policy.entity.update`
|`policy-entity`
|`update`
|Allows user or role to update a single or multiple permission policies and roles
|Allows a user or role to update a single or multiple permission policies and roles

|`policy.entity.delete`
|`policy-entity`
|`delete`
|Allows user or role to delete a single or multiple permission policies and roles
|Allows a user or role to delete a single or multiple permission policies and roles
|===

Kubernetes permissions::
Expand All @@ -181,7 +181,7 @@ Kubernetes permissions::
|`kubernetes.proxy`
|
|`use`
|Allows user or role to access the proxy endpoint
|Allows a user or role to access the proxy endpoint
|===

OCM permissions::
Expand Down Expand Up @@ -218,12 +218,12 @@ conditions:
|`ocm.entity.read`
|
|`read`
|Allows user or role to read from the OCM plugin
|Allows a user or role to read from the OCM plugin

|`ocm.cluster.read`
|
|`read`
|Allows user or role to read the cluster information in the OCM plugin
|Allows a user or role to read the cluster information in the OCM plugin
|===

Topology permissions::
Expand All @@ -239,10 +239,10 @@ Topology permissions::
|`topology.view.read`
|
|`read`
|Allows user or role to view the topology plugin
|Allows a user or role to view the topology plugin

|`kubernetes.proxy`
|
|`use`
|Allows user or role to access the proxy endpoint, allowing them to read pod logs and events within {product-very-short}
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
|===
Loading