Skip to content

Commit 6685147

Browse files
committed
rbac for deep search
1 parent 096eb89 commit 6685147

File tree

2 files changed

+9
-0
lines changed

2 files changed

+9
-0
lines changed
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# Access control for Deep Search
2+
3+
Granular controls for who can access [Deep Search](/deepsearch/) can be configured by site admins by tuning the roles assigned to users and the permissions granted to those roles. This page describes the permission types available for Deep Search, and whether they are granted by default to the **User** [system role](/admin/access_control#system-roles). All permissions are granted to the **Site Administrator** system role by default.
4+
5+
Name | Description | Granted to **User** by default?
6+
--------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | :-----------------------------:
7+
`deep_search:read` | <ul><li>User can see the Deep Search menu item in the top-level menu bar.</li><li>User can read their own threads and threads that are shared with them.</li></ul> | ✓
8+
`deep_search:write` | User can create or update a Deep Search. | ✓

docs/admin/access_control/index.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ To edit the permissions granted to a role, click the role to expand it, then sel
3939
You can read about the specific permission types available for each RBAC-enabled product area below:
4040

4141
- [Batch Changes](/admin/access_control/batch_changes)
42+
- [Deep Search](/admin/access_control/deep_search)
4243
- [Ownership](/admin/access_control/ownership)
4344
- [Service accounts](/admin/service_accounts)
4445

0 commit comments

Comments
 (0)