Skip to content

Commit

Permalink
RBAC for instance notifications (#1331)
Browse files Browse the repository at this point in the history
* RBAC for instance notifications

* Added "the" and reordered the list alphabetically

---------

Co-authored-by: Jonquil Williams <[email protected]>
  • Loading branch information
divolgin and jonquil2002 authored Jul 31, 2023
1 parent f673d5e commit cae5e7b
Showing 1 changed file with 35 additions and 19 deletions.
54 changes: 35 additions & 19 deletions docs/vendor/team-management-rbac-resource-names.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,12 +84,20 @@ Grants the holder permission to create a new license in the specified applicatio

### kots/app/[:appId]/license/[:customerId]/read

Grants the holder permission to view the license specified by ID. If this is denied, the licenses will not show up in search, CSV export or on the Vendor Portal.
Grants the holder permission to view the license specified by ID. If this is denied, the licenses will not show up in search, CSV export or on the Vendor Portal, and the holder will not be able to subscribe to this license's instance notifications.

### kots/app/[:appId]/license/[:customerId]/update

Grants the holder permission to edit the license specified by ID for the specified application(s).

### kots/app/[:appId]/license/[:customerId]/slack-notifications/read

Grants the holder permission to view the team's Slack notification subscriptions for instances associated with the specified license.

### kots/app/[:appId]/license/[:customerId]/slack-notifications/update

Grants the holder permission to edit the team's Slack notification subscriptions for instances associated with the specified license.

### kots/license/[:customerId]/airgap/password

Grants the holder permission to generate a new download portal password for the license specified (by ID) for the specified application(s).
Expand Down Expand Up @@ -162,6 +170,18 @@ Grants the holder permission to push images into Replicated registry.

## Team

### team/auditlog/read

Grants the holder permission to view the audit log for the team.

### team/authentication/update

Grants the holder permission to manage the following team authentication settings: Google authentication, Auto-join, and SAML authentication.

### team/authentication/read

Grants the holder permission to read the following authentication settings: Google authentication, Auto-join, and SAML authentication.

### team/integration/list

Grants the holder permission to view team's integrations.
Expand Down Expand Up @@ -190,21 +210,13 @@ Grants the holder permission to invite additional people to the team.

Grants the holder permission to delete other team members.

### team/serviceaccount/list

Grants the holder permission to list service accounts.

### team/serviceaccount/create

Grants the holder permission to create new service accounts.

### team/serviceaccount/[:name]/delete
### team/notifications/slack-webhook/read

Grants the holder permission to delete the service account identified by the name specified.
Grants the holder permission to view the team's Slack webhook for instance notifications.

### team/auditlog/read
### team/notifications/slack-webhook/update

Grants the holder permission to view the audit log for the team.
Grants the holder permission to edit the team's Slack webhook for instance notifications.

### team/policy/read

Expand All @@ -222,17 +234,21 @@ Grants the holder permission to delete RBAC policies for the team.

Grants the holder permission to create RBAC policies for the team.

### team/authentication/update
### team/security/update

Grants the holder permission to manage the following team authentication settings: Google authentication, Auto-join, and SAML authentication.
Grants the holder permission to manage team password requirements including two-factor authentication and password complexity requirements.

### team/authentication/read
### team/serviceaccount/list

Grants the holder permission to read the following authentication settings: Google authentication, Auto-join, and SAML authentication.
Grants the holder permission to list service accounts.

### team/security/update
### team/serviceaccount/create

Grants the holder permission to manage team password requirements including two-factor authentication and password complexity requirements.
Grants the holder permission to create new service accounts.

### team/serviceaccount/[:name]/delete

Grants the holder permission to delete the service account identified by the name specified.

### team/support-issues/read

Expand Down

0 comments on commit cae5e7b

Please sign in to comment.