Skip to content

Commit 2e9f203

Browse files
committed
doc(CU-869azd0ae): update meaning of system role
1 parent f047ec8 commit 2e9f203

File tree

2 files changed

+7
-4
lines changed

2 files changed

+7
-4
lines changed

docs/concepts/authorization/rbac-system.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -208,9 +208,11 @@ Root Space
208208

209209
## Roles
210210

211-
### Predefined roles
211+
### System roles
212212

213-
Spacelift provides three predefined roles (corresponding to the legacy system roles):
213+
System roles provide standard, least-privileged permission policies for granting access to specific pieces of Spacelift functionality. For example, the `Worker pool controller` role contains the correct permissions to allow the Kubernetes controller to manage worker pools automatically.
214+
215+
System roles are immutable and cannot be modified or deleted, ensuring consistent baseline permissions across all accounts.
214216

215217
#### Space reader
216218

docs/concepts/spaces/access-control.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,14 @@ specific spaces, providing precise control over who can access what resources.
77

88
## Roles and RBAC
99

10-
### Predefined roles
10+
### System roles
1111

12-
Spacelift provides three predefined roles that can be assigned to users on a space-by-space basis:
12+
Spacelift provides following predefined system roles that can be assigned to users on a space-by-space basis:
1313

1414
- **Space Reader** - View-only access to resources within the space, can add comments to runs for collaboration
1515
- **Space Writer** - Space Reader permissions + ability to trigger runs and modify environment variables
1616
- **Space Admin** - Space Writer permissions + ability to create and modify stacks and attachable entities
17+
- **Worker pool controller** - The role required to allow the Kubernetes WorkerPool controller to manage pools automatically. This role should be used when creating an API key for the controller.
1718

1819
These predefined roles correspond to the legacy system roles (Read/Write/Admin) and provide a simple starting point for
1920
organizations new to RBAC.

0 commit comments

Comments
 (0)