Skip to content

Commit 4894ace

Browse files
Apply suggestions from code review
Co-authored-by: Jessica <[email protected]>
1 parent 0b04b3d commit 4894ace

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

pages/kubernetes/reference-content/set-iam-permissions-and-implement-rbac.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Key components of RBAC in Kubernetes include:
2929
- **Subjects:** A subject in RBAC can be a user, a group, or a service account to which roles or cluster roles are bound.
3030
- **Rules:** Rules are sets of permissions associated with roles or cluster roles. They specify what actions are allowed or denied on specific resources.
3131

32-
RBAC works seamlessly with Scaleway's IAM (Identity and Access Maanagement) system. [Identity and Access Management (IAM)](/iam/concepts/#iam) provides control over resource access. IAM policies enable the configuration of permissions for Kubernetes Kapsule clusters at the Project level.
32+
RBAC works seamlessly with Scaleway's IAM (Identity and Access Management) system. [Identity and Access Management (IAM)](/iam/concepts/#iam) provides control over resource access. IAM policies enable the configuration of permissions for Kubernetes Kapsule clusters at the Project level.
3333

3434
An [IAM policy](/iam/concepts/#policy) defines the permissions for users, groups, and applications within an Organization. It consists of a [principal](/iam/concepts/#principal) (the user, group, or application to which it applies) and IAM rules that specify permission sets and their scope.
3535

@@ -40,7 +40,7 @@ The combination of IAM and Kubernetes RBAC allows you to define fine-grained acc
4040

4141
The following IAM permission sets are mapped to Kubernetes groups:
4242

43-
| IAM Permission Set | Kubernetes Group | Notes |
43+
| IAM permission set | Kubernetes group | Notes |
4444
|----------------------------------|-----------------------------|--------------------------|
4545
| `KubernetesFullAccess` | `scaleway:cluster-write` | |
4646
| | `scaleway:cluster-read` | |
@@ -137,7 +137,7 @@ After these steps, members of the IAM group will have read access to the cluster
137137

138138
## Assigning permissions to a specific user without using a group
139139

140-
1. Assign the `KubernetesReadOnly` Permission Set to the user.
140+
1. Assign the `KubernetesReadOnly` permission set to the user.
141141
2. Retrieve the **IAM user ID** and note it.
142142
3. Create the following manifests:
143143

0 commit comments

Comments
 (0)