diff --git a/docs/access-control-and-security/applications.md b/docs/access-control-and-security/applications.md index f5d13f7d..dabd162d 100644 --- a/docs/access-control-and-security/applications.md +++ b/docs/access-control-and-security/applications.md @@ -59,12 +59,12 @@ Configure the application’s roles and permissions to control what your applica 3. Enter the application name. 4. Select **Save**. The application has been created. You can proceed to add roles or permissions to the application. -2. Generate access keys. - 1. In the Access Keys section, select **+ Create access key** to generate a unique keyId and keySecret. The Key Secret is shown only once, so make sure to copy and store it securely. -3. Add roles to the application. +2. Add roles to the application. 1. In the Application Roles or Unrestricted Roles section, toggle the different application roles for your application. +3. Generate access keys. + 1. In the Access Keys section, select **+ Create access key** to generate a unique keyId and keySecret. The Key Secret is shown only once, so make sure to copy and store it securely. 4. Add permissions to grant application-level access to resources. - 1. In the Permissions section, select **+ Add Permission**. + 1. In the Permissions section, select **+ Add permission**. 2. Toggle between each resource type and select the resources to provide access to. 3. Toggle the access levels for your selected resource: * **Read**—The application will be able to view the resource. diff --git a/docs/access-control-and-security/rbac-overview.md b/docs/access-control-and-security/rbac-overview.md index cb37e4ab..855112f3 100644 --- a/docs/access-control-and-security/rbac-overview.md +++ b/docs/access-control-and-security/rbac-overview.md @@ -79,6 +79,7 @@ If multiple roles are granted, they will have all granted role-level permissions | Metadata Manager | Can create, update, delete, and grant permissions to any workflow or task definition in the cluster.

This role can only be granted by an Admin. | | Workflow Manager | Can start, pause, resume, rerun, and delete any workflow execution in the cluster.

This role can only be granted by an Admin. | | Application Manager | Can create, update, and delete any application in the cluster.

This role can only be granted by an Admin. | +| Admin | Can create, read, modify, delete, and execute this particular application.

This role can only be granted by an Admin. | @@ -91,10 +92,10 @@ Besides the role-based permissions, you can add granular permissions to **groups * Tasks * Secrets * Environment variables -* Integrations -* Prompts * Tags * Domains +* Integrations +* Prompts Unlike other permission targets, **tags** and **domains** provide bulk access to multiple resources. Tags can be used to grant resources across almost every resource type. When you grant access for a tag “x”, all resources with the tag “x” will be made available to the group or application. diff --git a/docs/access-control-and-security/tags.md b/docs/access-control-and-security/tags.md index 6c6ac959..d0cedc51 100644 --- a/docs/access-control-and-security/tags.md +++ b/docs/access-control-and-security/tags.md @@ -95,7 +95,7 @@ The application now has access to all resources under the tag. You can select th -Watch how to use tags to manage permissions in Orkes Platform. +Watch how to use tags to manage permissions in Orkes Conductor.