Skip to content

Commit 90fdb98

Browse files
authored
Update RBAC docs for non-root admin role management (#965)
* docs: update RBAC docs for non-root admin role management * docs: add changelog entry
1 parent 4f10f48 commit 90fdb98

File tree

6 files changed

+52
-12
lines changed

6 files changed

+52
-12
lines changed

docs/concepts/authorization/assigning-roles-api-keys.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,14 @@
1313

1414
### Assign roles to API keys directly using the web UI
1515

16+
!!! info "Permission Scope"
17+
- **Root Space Admins** can create/modify/delete API keys and manage role bindings across all spaces
18+
- **Non-root Space Admins** can view all API keys but only manage role bindings for spaces they administer; they cannot create/modify/delete API keys
19+
1620
1. Verify you meet the prerequisites:
1721
1. The selected management strategy for your organization must be User Management.
1822
2. The key must exist in your Spacelift organization.
19-
3. You must have appropriate permissions to manage API key roles.
23+
3. You must have Space Admin permissions on the target space where you want to assign roles (or Root Space Admin permissions for all spaces).
2024
4. Spaces where you want to assign roles must exist.
2125
2. Navigate to _API Key Management_:
2226
1. Click your name in the bottom left corner of the Spacelift interface.

docs/concepts/authorization/assigning-roles-groups.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,14 @@ IdP groups can receive roles through direct group assignment. Assign roles to th
66

77
### Assign roles to IdP groups using the web UI
88

9+
!!! info "Permission Scope"
10+
- **Root Space Admins** can create/modify/delete IdP group mappings and manage role bindings across all spaces
11+
- **Non-root Space Admins** can view all IdP group mappings but only manage role bindings for spaces they administer; they cannot create/modify/delete IdP group mappings
12+
913
1. Verify you meet the prerequisites:
1014
1. The selected management strategy for your organization must be User Management.
1115
2. Your identity provider [must be connected to Spacelift](../../integrations/single-sign-on/README.md).
12-
3. You must have appropriate permissions to manage user group roles.
16+
3. You must have Space Admin permissions on the target space where you want to assign roles (or Root Space Admin permissions for all spaces).
1317
4. Target spaces must exist where you want to assign roles.
1418
2. Navigate to IdP group mapping:
1519
1. Click your name in the bottom left corner of the Spacelift interface.

docs/concepts/authorization/assigning-roles-users.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,13 @@ Users can get permissions from three sources:
1313

1414
### Assign roles to users directly using the web UI
1515

16+
!!! info "Permission Scope"
17+
- **Root Space Admins** can manage role bindings across all spaces and invite/revoke users
18+
- **Non-root Space Admins** can only manage role bindings for spaces they administer and cannot invite/revoke users
19+
1620
1. Verify you meet the prerequisites:
1721
- User must be invited to the Spacelift organization.
18-
- You must have appropriate permissions to manage user roles.
22+
- You must have Space Admin permissions on the target space where you want to assign roles (or Root Space Admin permissions for all spaces).
1923
- Target spaces must exist where you want to assign roles.
2024
- The selected management strategy for your organization must be User Management.
2125
2. Navigate to _User Management_:

docs/concepts/authorization/rbac-system.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -259,10 +259,25 @@ System roles are immutable and cannot be modified or deleted, ensuring consisten
259259
- Create and modify stacks.
260260
- Create and modify contexts and policies.
261261
- Manage space settings (when assigned to specific space).
262+
- View all roles, users, API keys, and IdP group mappings in the organization (read-only).
263+
- Manage role bindings (assign/remove roles) for users, API keys, and IdP groups within the spaces they administer.
262264
- Equivalent to legacy **Admin** role.
263265

264-
!!! info "Root Space Admin"
265-
Users with Space Admin role on the **root** space become **Root Space Admins** with account-wide privileges including SSO setup, VCS configuration, and audit trail management.
266+
!!! info "Root Space Admin vs Non-root Space Admin"
267+
**Root Space Admins** (Space Admin role on the **root** space) have account-wide privileges including:
268+
269+
- All Space Admin permissions across all spaces
270+
- SSO setup, VCS configuration, audit trail management
271+
- Invite/revoke users and create/modify/delete roles
272+
- Create/modify/delete API keys and IdP group mappings
273+
- Manage role bindings across all spaces
274+
275+
**Non-root Space Admins** (Space Admin role on any non-root space) have limited privileges:
276+
277+
- Space Admin permissions only within the spaces they administer
278+
- Can view all roles, users, API keys, and IdP group mappings
279+
- Can manage role bindings only for the spaces they administer
280+
- Cannot invite/revoke users, create/modify/delete roles, or create/modify/delete API keys and IdP group mappings
266281

267282
#### Worker pool controller
268283

docs/concepts/spaces/access-control.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,17 @@ A "Root Space Admin" is a user given administrative permissions to the `root` sp
3535

3636
| Action / Role | Root Space Admin | Space Admin | Space Writer | Space Reader |
3737
| ------------------------------------------------ | ---------------- | ----------- | ------------ | ------------ |
38-
| Set up SSO |||||
39-
| Set up VCS |||||
40-
| Manage Sessions |||||
41-
| Manage Login Policies & User Management Controls |||||
42-
| Manage Audit Trails |||||
43-
| Manage Spaces ||* |||
38+
| Set up SSO |||||
39+
| Set up VCS |||||
40+
| Manage Sessions |||||
41+
| Manage Login Policies & User Management Controls |||||
42+
| Manage Audit Trails |||||
43+
| Invite/Revoke Users |||||
44+
| Create/Modify/Delete Roles |||||
45+
| Create/Modify/Delete API Keys, IdP Group Mappings |||||
46+
| View Roles, Users, API Keys, IdP Group Mappings |||||
47+
| Manage Role Bindings ||* |||
48+
| Manage Spaces ||** |||
4449
| Manage Stack Config Settings |||||
4550
| Manage Worker Pools, Contexts |||||
4651
| Manage Stack Env Vars |||||
@@ -49,7 +54,9 @@ A "Root Space Admin" is a user given administrative permissions to the `root` sp
4954
| View Spaces |||||
5055
| View Worker Pools, Contexts |||||
5156

52-
*Can only manage assigned space(s)
57+
*Can only manage role bindings for assigned space(s)
58+
59+
**Can only manage assigned space(s)
5360

5461
## Authorization methods
5562

docs/product/changelog.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,12 @@ description: Find out about the latest changes to Spacelift.
44

55
# Changelog
66

7+
## 2025-11-17
8+
9+
### Features
10+
11+
- **Authorization & RBAC**: Non-root Space Admins can now view all roles, users, API keys, and IdP group mappings (read-only) and manage role bindings within their administered spaces. Previously, these capabilities were limited to Root Space Admins only. See the [RBAC system documentation](../concepts/authorization/rbac-system.md#space-admin) for details.
12+
713
## 2025-11-13
814

915
### Features

0 commit comments

Comments
 (0)