Skip to content

Commit 27221a8

Browse files
committed
feedback from doc review
1 parent 2fcd0d3 commit 27221a8

File tree

2 files changed

+9
-11
lines changed

2 files changed

+9
-11
lines changed

modules/manage/partials/rbac-delete-role.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,4 @@ To delete an existing role:
66

77
. Click *Delete*.
88

9-
. {ui} displays a prompt asking you to confirm deletion of the role. The prompt differs based on whether there are principals assigned to the role or not. If there are principals assigned to the role, you must type the role name in the input field when prompted before you can continue.
10-
119
. Click *Delete*.

modules/manage/partials/rbac-dp.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -116,8 +116,8 @@ Permission resolution rules:
116116

117117
A user is permitted to perform an operation if and only if:
118118

119-
. No DENY permission exists matching the operation
120-
. An ALLOW permission exists matching the operation
119+
. No `DENY` permission exists matching the operation
120+
. An `ALLOW` permission exists matching the operation
121121

122122
Examples:
123123

@@ -127,22 +127,22 @@ Examples:
127127

128128
| `ALLOW READ topic:logs`
129129
| Role has `DENY READ topic:logs`
130-
| ❌ DENIED
131-
| DENY always takes precedence
130+
| ❌ denied
131+
| `DENY` always takes precedence
132132

133133
| `DENY WRITE topic:sensitive`
134134
| Role has `ALLOW WRITE topic:*`
135-
| ❌ DENIED
136-
| Specific DENY blocks wildcard ALLOW
135+
| ❌ denied
136+
| Specific `DENY` blocks wildcard `ALLOW`
137137

138138
| No direct ACLs
139139
| Role has `ALLOW READ topic:data`
140-
| ✅ ALLOWED
140+
| ✅ allowed
141141
| Role permission applies
142142

143143
| `ALLOW READ topic:public`
144144
| No role ACLs for this topic
145-
| ✅ ALLOWED
145+
| ✅ allowed
146146
| Direct permission applies
147147
|===
148148

@@ -187,7 +187,7 @@ Permission management
187187

188188
* Start with minimal permissions: Grant only the access required for the role's function
189189
* Use wildcards carefully: Prefixed patterns like `analytics-*` are useful but review regularly
190-
* Avoid DENY rules: Prefer specific ALLOW rules over complex DENY/ALLOW combinations
190+
* Avoid `DENY` rules: Prefer specific `ALLOW` rules over complex `DENY`/`ALLOW` combinations
191191
* Document role purpose: Maintain clear documentation about what each role is intended for
192192

193193
Operational guidelines

0 commit comments

Comments
 (0)