Skip to content

Commit

Permalink
Improved wordigin on rbac mention
Browse files Browse the repository at this point in the history
Co-authored-by: Michael Peter <mipeter@redhat.com>
  • Loading branch information
bentito and michaelryanpeter authored Nov 6, 2024
1 parent 98c3b3b commit 6e022f2
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/concepts/how-to-grant-api-access.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

When cluster extensions are managed via OLM, they often provide Custom Resource Definitions (CRDs) that expose new API resources. Typically, cluster administrators hold full management access to these resources by default, whereas non-administrative users may lack sufficient permissions. Such users often need designated permissions to create, view, or edit these Custom Resources.

OLM does **not** automatically configure or manage RBAC for users to interact with the APIs provided by installed packages. It is recommended that cluster administrators manage RBAC (Role-Based Access Control) to grant appropriate permissions to non-administrative users. This guide outlines the steps to manually configure RBAC, with a focus on creating ClusterRoles and binding them to specific users or groups.
OLM v1 does **not** automatically configure or manage role-based access control (RBAC) for users to interact with the APIs provided by installed packages. Cluster administrators must manage RBAC to grant appropriate permissions to non-administrative users. This guide outlines the steps to manually configure RBAC, with a focus on creating ClusterRoles and binding them to specific users or groups.

---

Expand Down

0 comments on commit 6e022f2

Please sign in to comment.