Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 5 additions & 26 deletions modules/authorization/ref-rbac-permission-policies.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -33,8 +33,6 @@ g, user:default/myuser, role:default/myrole

{product-short} supports following permission policies:

Catalog permissions::

.Catalog permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand Down Expand Up @@ -79,8 +77,6 @@ Catalog permissions::
|Allows a user or role to delete locations from the catalog
|===

Bulk import permission::

.Bulk import permission
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand All @@ -96,8 +92,6 @@ Bulk import permission::

|===

Scaffolder permissions::

.Scaffolder permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand Down Expand Up @@ -142,8 +136,6 @@ Scaffolder permissions::
|Allows a user or role to access frontend template management features, including editing, previewing, and trying templates, forms, and custom fields.
|===

RBAC permissions::

.RBAC permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand Down Expand Up @@ -173,8 +165,6 @@ RBAC permissions::
|Allows a user or role to delete a single or multiple permission policies and roles
|===

Kubernetes permissions::

.Kubernetes permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand Down Expand Up @@ -210,19 +200,19 @@ result: CONDITIONAL
roleEntityRef: 'role:default/<YOUR_ROLE>'
pluginId: catalog
resourceType: catalog-entity
permissionMapping:
permissionMapping:
- read
- update
- delete
conditions:
not:
conditions:
not:
rule: HAS_SPEC
resourceType: catalog-entity
params:
params:
key: type
value: kubernetes-cluster
----

.OCM permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
|Name
Expand All @@ -241,8 +231,6 @@ conditions:
|Allows a user or role to read the cluster information in the OCM plugin
|===

Topology permissions::

.Topology permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand All @@ -267,9 +255,6 @@ Topology permissions::
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
|===


Tekton permissions::

.Tekton permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand All @@ -294,9 +279,6 @@ Tekton permissions::
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
|===


ArgoCD permissions::

.ArgoCD permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand All @@ -311,9 +293,6 @@ ArgoCD permissions::
|Allows a user to read from the ArgoCD plugin
|===


Quay permissions::

.Quay permissions
[cols="15%,25%,15%,45%", frame="all", options="header"]
|===
Expand Down