You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* DOC-1864: Document Cloud RBAC UX enhancements for service account scoping
- Remove incorrect statement that service accounts are always assigned
org-wide Admin role
- Add Service account roles section documenting scoped role assignment
- Add RBAC UX enhancements entry to What's New (March 2026)
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
* minor edit
* incorporate review feedback
---------
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: modules/security/pages/authorization/rbac/rbac.adoc
+15-11Lines changed: 15 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,46 +17,50 @@ After reading this page, you will be able to:
17
17
18
18
== RBAC terminology
19
19
20
-
**Role**: A role is a list of permissions. With RBAC, permissions are attached to roles. Users assigned multiple roles receive the union of all permissions defined in those roles. Redpanda Cloud has several predefined roles that you cannot modify or delete, including Reader, Writer, and Admin. You can also create custom roles.
20
+
**Role**: A role is a list of permissions. With RBAC, permissions are attached to roles. Users assigned multiple roles receive the union of all permissions defined in those roles.
21
21
22
22
**Account**: An RBAC account is either a user account (human user) or a service account (machine or programmatic user).
23
23
24
24
**Role binding**: Role binding assigns a role to an account. Administrators can add, edit, or remove role bindings for a user. When you change the permissions for a given role, all users and service accounts with that role automatically get the modified permissions.
25
25
26
26
== Manage organization access
27
27
28
-
In the Redpanda Cloud Console, the *Organization IAM* page lists your organization's existing users and service accounts and their associated roles. You can edit a user's access, invite new users, and create service accounts. When you add a user, you define their permissions with role binding. Service accounts are assigned the Admin role for all resources in the organization.
28
+
In the Redpanda Cloud Console, the *Organization IAM* page lists your organization's users and service accounts and their assigned roles. You can invite users, create service accounts, and edit access for existing accounts. When you add a user or service account, you assign permissions through role bindings.
29
29
30
-
On the *Organization IAM - Users* page, select a user to see their assigned roles. For example, for a user with Admin access on the organization, the user's _Resource_ is the organization name, the _Scope_ is organization, and the _Role_ is Admin.
30
+
On the *Organization IAM* page, select a user or service account to view its assigned roles. For example, if a user has the Admin role at the organization level, the _Resource_ is the organization name, the _Scope_ is Organization, and the _Role_ is Admin. You can edit a user or service account to assign a different role or limit access to a specific resource.
31
31
32
-
Various resources can be assigned as the scope of a role. For example:
32
+
Role bindings can be scoped to different resource types, including:
33
33
34
-
- Organization
34
+
- Organization
35
35
- Resource group
36
36
- Network
37
37
- Network peering
38
38
- Cluster (Serverless clusters have a different set of permissions from BYOC and Dedicated clusters.)
39
-
- MCP server
40
39
41
-
NOTE: Redpanda topics are not included. For topic-level access control, see xref:security:authorization/rbac/rbac_dp.adoc[Configure RBAC in the Data Plane].
40
+
[NOTE]
41
+
====
42
+
* Redpanda topics are not included as a scope. For topic-level access control, see xref:security:authorization/rbac/rbac_dp.adoc[Configure RBAC in the Data Plane].
42
43
43
-
Users can have multiple roles, as long as they are each for a different resource and scope. For example, you could assign a user the Reader role on the organization, the Admin role on a specific resource group, and the Writer role on a specific cluster.
44
+
* You can assign a service account only to resources for which you already have permission. For example, if you have the Admin role for a specific resource group, you can create a service account scoped to that resource group.
45
+
====
44
46
45
-
When you delete a role, Redpanda removes it from any user or service account it is attached to, and permissions are revoked.
47
+
Users can have multiple roles if each role binding applies to a different resource or scope. For example, a user could have the Reader role for the organization, the Admin role for a specific resource group, and the Writer role for a specific cluster.
48
+
49
+
When you delete a custom role, Redpanda removes it from any users or service accounts assigned to it, and the associated permissions are revoked.
46
50
47
51
== Predefined roles
48
52
49
53
include::security:partial$predefined-roles.adoc[]
50
54
51
55
== Custom roles
52
56
53
-
In addition to the predefined roles, administrators can create custom roles to mix and match permissions for specific use cases. Custom roles let you grant only the permissions a user needs, without the broad access of predefined roles.
57
+
In addition to the predefined roles, administrators can create custom roles to grant only the permissions an account needs, without the broad access of predefined roles.
54
58
55
59
To create a custom role, use the https://cloud.redpanda.com[Redpanda Cloud Console^] or the link:/api/doc/cloud-controlplane/[Control Plane API].
56
60
57
61
In the Redpanda Cloud Console:
58
62
59
-
. In the left navigation menu, select *Organization IAM*, then select the *Roles* tab.
63
+
. In the left navigation menu, select the *Organization IAM* - *Roles* tab
60
64
. Click *Create role*.
61
65
. Enter a *Name* and optional *Description* for the role.
62
66
. Select permissions from the available categories: *Control Plane*, *Data Plane*, *IAM*, and *Billing*. Each category contains multiple permission groups (for example, Cluster, Network, or Topic), and each group contains individual operations such as Create, Read, Update, and Delete. You can select operations individually or select all operations for a group.
Redpanda Cloud provides several predefined roles that you cannot modify or delete, including Reader, Writer, and Admin.
2
2
3
-
You can see all predefined roles along with their permissions on the *Roles* tab of *Organization IAM*.
3
+
Before assigning a role to a user or service account, review the *Organization IAM* - *Roles* tab to compare the full list of predefined roles and their permissions.
0 commit comments