You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/concepts/authorization/assigning-roles-groups.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,10 +6,14 @@ IdP groups can receive roles through direct group assignment. Assign roles to th
6
6
7
7
### Assign roles to IdP groups using the web UI
8
8
9
+
!!! info "Permission Scope"
10
+
- **Root Space Admins** can create/modify/delete IdP group mappings and manage role bindings across all spaces
11
+
- **Non-root Space Admins** can view all IdP group mappings but only manage role bindings for spaces they administer; they cannot create/modify/delete IdP group mappings
12
+
9
13
1. Verify you meet the prerequisites:
10
14
1. The selected management strategy for your organization must be User Management.
11
15
2. Your identity provider [must be connected to Spacelift](../../integrations/single-sign-on/README.md).
12
-
3. You must have appropriate permissions to manage user group roles.
16
+
3. You must have Space Admin permissions on the target space where you want to assign roles (or Root Space Admin permissions for all spaces).
13
17
4. Target spaces must exist where you want to assign roles.
14
18
2. Navigate to IdP group mapping:
15
19
1. Click your name in the bottom left corner of the Spacelift interface.
Copy file name to clipboardExpand all lines: docs/concepts/authorization/rbac-system.md
+17-2Lines changed: 17 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -259,10 +259,25 @@ System roles are immutable and cannot be modified or deleted, ensuring consisten
259
259
- Create and modify stacks.
260
260
- Create and modify contexts and policies.
261
261
- Manage space settings (when assigned to specific space).
262
+
- View all roles, users, API keys, and IdP group mappings in the organization (read-only).
263
+
- Manage role bindings (assign/remove roles) for users, API keys, and IdP groups within the spaces they administer.
262
264
- Equivalent to legacy **Admin** role.
263
265
264
-
!!! info "Root Space Admin"
265
-
Users with Space Admin role on the **root** space become **Root Space Admins** with account-wide privileges including SSO setup, VCS configuration, and audit trail management.
266
+
!!! info "Root Space Admin vs Non-root Space Admin"
267
+
**Root Space Admins** (Space Admin role on the **root** space) have account-wide privileges including:
Copy file name to clipboardExpand all lines: docs/product/changelog.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,12 @@ description: Find out about the latest changes to Spacelift.
4
4
5
5
# Changelog
6
6
7
+
## 2025-11-17
8
+
9
+
### Features
10
+
11
+
-**Authorization & RBAC**: Non-root Space Admins can now view all roles, users, API keys, and IdP group mappings (read-only) and manage role bindings within their administered spaces. Previously, these capabilities were limited to Root Space Admins only. See the [RBAC system documentation](../concepts/authorization/rbac-system.md#space-admin) for details.
0 commit comments