Skip to content

Commit 51d290c

Browse files
micheleRPclaude
andauthored
DOC-1864: Document Cloud RBAC UX enhancements (#555)
* DOC-1864: Document Cloud RBAC UX enhancements for service account scoping - Remove incorrect statement that service accounts are always assigned org-wide Admin role - Add Service account roles section documenting scoped role assignment - Add RBAC UX enhancements entry to What's New (March 2026) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * minor edit * incorporate review feedback --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent 3cd5532 commit 51d290c

File tree

2 files changed

+16
-12
lines changed

2 files changed

+16
-12
lines changed

modules/security/pages/authorization/rbac/rbac.adoc

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -17,46 +17,50 @@ After reading this page, you will be able to:
1717
1818
== RBAC terminology
1919

20-
**Role**: A role is a list of permissions. With RBAC, permissions are attached to roles. Users assigned multiple roles receive the union of all permissions defined in those roles. Redpanda Cloud has several predefined roles that you cannot modify or delete, including Reader, Writer, and Admin. You can also create custom roles.
20+
**Role**: A role is a list of permissions. With RBAC, permissions are attached to roles. Users assigned multiple roles receive the union of all permissions defined in those roles.
2121

2222
**Account**: An RBAC account is either a user account (human user) or a service account (machine or programmatic user).
2323

2424
**Role binding**: Role binding assigns a role to an account. Administrators can add, edit, or remove role bindings for a user. When you change the permissions for a given role, all users and service accounts with that role automatically get the modified permissions.
2525

2626
== Manage organization access
2727

28-
In the Redpanda Cloud Console, the *Organization IAM* page lists your organization's existing users and service accounts and their associated roles. You can edit a user's access, invite new users, and create service accounts. When you add a user, you define their permissions with role binding. Service accounts are assigned the Admin role for all resources in the organization.
28+
In the Redpanda Cloud Console, the *Organization IAM* page lists your organization's users and service accounts and their assigned roles. You can invite users, create service accounts, and edit access for existing accounts. When you add a user or service account, you assign permissions through role bindings.
2929

30-
On the *Organization IAM - Users* page, select a user to see their assigned roles. For example, for a user with Admin access on the organization, the user's _Resource_ is the organization name, the _Scope_ is organization, and the _Role_ is Admin.
30+
On the *Organization IAM* page, select a user or service account to view its assigned roles. For example, if a user has the Admin role at the organization level, the _Resource_ is the organization name, the _Scope_ is Organization, and the _Role_ is Admin. You can edit a user or service account to assign a different role or limit access to a specific resource.
3131

32-
Various resources can be assigned as the scope of a role. For example:
32+
Role bindings can be scoped to different resource types, including:
3333

34-
- Organization
34+
- Organization
3535
- Resource group
3636
- Network
3737
- Network peering
3838
- Cluster (Serverless clusters have a different set of permissions from BYOC and Dedicated clusters.)
39-
- MCP server
4039

41-
NOTE: Redpanda topics are not included. For topic-level access control, see xref:security:authorization/rbac/rbac_dp.adoc[Configure RBAC in the Data Plane].
40+
[NOTE]
41+
====
42+
* Redpanda topics are not included as a scope. For topic-level access control, see xref:security:authorization/rbac/rbac_dp.adoc[Configure RBAC in the Data Plane].
4243
43-
Users can have multiple roles, as long as they are each for a different resource and scope. For example, you could assign a user the Reader role on the organization, the Admin role on a specific resource group, and the Writer role on a specific cluster.
44+
* You can assign a service account only to resources for which you already have permission. For example, if you have the Admin role for a specific resource group, you can create a service account scoped to that resource group.
45+
====
4446

45-
When you delete a role, Redpanda removes it from any user or service account it is attached to, and permissions are revoked.
47+
Users can have multiple roles if each role binding applies to a different resource or scope. For example, a user could have the Reader role for the organization, the Admin role for a specific resource group, and the Writer role for a specific cluster.
48+
49+
When you delete a custom role, Redpanda removes it from any users or service accounts assigned to it, and the associated permissions are revoked.
4650

4751
== Predefined roles
4852

4953
include::security:partial$predefined-roles.adoc[]
5054

5155
== Custom roles
5256

53-
In addition to the predefined roles, administrators can create custom roles to mix and match permissions for specific use cases. Custom roles let you grant only the permissions a user needs, without the broad access of predefined roles.
57+
In addition to the predefined roles, administrators can create custom roles to grant only the permissions an account needs, without the broad access of predefined roles.
5458

5559
To create a custom role, use the https://cloud.redpanda.com[Redpanda Cloud Console^] or the link:/api/doc/cloud-controlplane/[Control Plane API].
5660

5761
In the Redpanda Cloud Console:
5862

59-
. In the left navigation menu, select *Organization IAM*, then select the *Roles* tab.
63+
. In the left navigation menu, select the *Organization IAM* - *Roles* tab
6064
. Click *Create role*.
6165
. Enter a *Name* and optional *Description* for the role.
6266
. Select permissions from the available categories: *Control Plane*, *Data Plane*, *IAM*, and *Billing*. Each category contains multiple permission groups (for example, Cluster, Network, or Topic), and each group contains individual operations such as Create, Read, Update, and Delete. You can select operations individually or select all operations for a group.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
Redpanda Cloud provides several predefined roles that you cannot modify or delete, including Reader, Writer, and Admin.
22

3-
You can see all predefined roles along with their permissions on the *Roles* tab of *Organization IAM*.
3+
Before assigning a role to a user or service account, review the *Organization IAM* - *Roles* tab to compare the full list of predefined roles and their permissions.

0 commit comments

Comments
 (0)