Skip to content

Commit dec70fd

Browse files
committed
DOC-4354 RS: Add new user manager role
1 parent db120a1 commit dec70fd

File tree

4 files changed

+4
-2
lines changed

4 files changed

+4
-2
lines changed

content/operate/rs/references/rest-api/objects/role.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ An API object that represents a role.
1717
| uid | integer | Role's unique ID |
1818
| account_id | integer | SM account ID |
1919
| action_uid | string | Action UID. If it exists, progress can be tracked by the GET /actions/{uid} API (read-only) |
20-
| management | 'admin'<br />'db_member'<br />'db_viewer'<br />'cluster_member'<br />'cluster_viewer'<br />'none' | [Management role]({{< relref "/operate/rs/references/rest-api/permissions#roles" >}}) |
20+
| management | 'admin'<br />'db_member'<br />'db_viewer'<br />'cluster_member'<br />'cluster_viewer'<br />'user_manager'<br />'none' | [Management role]({{< relref "/operate/rs/references/rest-api/permissions#roles" >}}) |
2121
| name | string | Role's name |

content/operate/rs/references/rest-api/objects/user.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,6 @@ An API object that represents a Redis Enterprise user.
2626
| password | string | User's password. If `password_hash_method` is set to `1`, the password should be hashed using SHA-256. The format before hashing is `username:clustername:password`. |
2727
| password_hash_method | '1' | Used when password is passed pre-hashed to specify the hashing method |
2828
| password_issue_date | string | The date in which the password was set (read-only) |
29-
| role | 'admin'<br />'cluster_member'<br />'cluster_viewer'<br />'db_member'<br /> **'db_viewer'** <br />'none' | User's [role]({{< relref "/operate/rs/references/rest-api/permissions#roles" >}}) |
29+
| role | 'admin'<br />'cluster_member'<br />'cluster_viewer'<br />'db_member'<br /> **'db_viewer'** <br />'user_manager'<br />'none' | User's [role]({{< relref "/operate/rs/references/rest-api/permissions#roles" >}}) |
3030
| role_uids | array of integers | UIDs of user's roles for role-based access control |
3131
| status | 'active'<br />'locked' | User sign-in status (read-only)<br />**active**: able to sign in<br />**locked**: unable to sign in |

content/operate/rs/references/rest-api/permissions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ Available management roles include:
2626
- **[db_member](#db-member-role)**: Can create or modify databases and view their info.
2727
- **[cluster_viewer](#cluster-viewer-role)**: Can view cluster and database info.
2828
- **[cluster_member](#cluster-member-role)**: Can modify the cluster and databases and view their info.
29+
- **[user_manager](#user-manager-role)**: Can modify users and view their info.
2930
- **[admin](#admin-role)**: Can view and modify all elements of the cluster.
3031

3132
## Permissions list for each role

content/operate/rs/security/access-control/create-cluster-roles.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ Redis Enterprise Software includes five predefined roles that determine a user's
2222
1. **DB Member** - Administer databases
2323
1. **Cluster Viewer** - Read cluster settings
2424
1. **Cluster Member** - Administer the cluster
25+
1. **User Manager** - Administer users
2526
1. **Admin** - Full cluster access
2627
1. **None** - For data access only - cannot access the Cluster Manager UI or use the REST API
2728

0 commit comments

Comments
 (0)