Skip to content

Commit 2b527d9

Browse files
authored
RHIDP-5483: Update Authorization Preface (#1052)
* RHIDP-5483: Update Authorization Preface * RHIDP-5483: Update Authorization Abstract * RHIDP-5483: Apply reviewer suggestions
1 parent 035e4eb commit 2b527d9

File tree

3 files changed

+8
-18
lines changed

3 files changed

+8
-18
lines changed

assemblies/assembly-configuring-authorization-in-rhdh.adoc

+7-16
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,18 @@
11
[id='configuring-authorization-in-rhdh']
22
= Configuring authorization in {product}
33

4-
In link:{authorization-book-url}[{authentication-book-title}], you learnt how to authenticate users to {product}.
5-
{product-short} knowns who the users are.
4+
Administrators can authorize users to perform actions and define what users can do in {product-short}.
65

7-
In this book, learn how to authorize users to perform actions in {product-short}.
8-
Define what users can do in {product-short}.
6+
Role-based access control (RBAC) is a security concept that defines how to control access to resources in a system by specifying a mapping between users of the system and the actions that those users can perform on resources in the system.
7+
You can use RBAC to define roles with specific permissions and then assign the roles to users and groups.
98

10-
Role-Based Access Control (RBAC) is a security concept that controls access to resources in a system, and specifies a mapping between users of the system, and the actions they can perform on resources in the system.
11-
You define roles with specific permissions, and then assign the roles to users and groups.
9+
RBAC on {product-short} is built on top of the Permissions framework, which defines RBAC policies in code. Rather than defining policies in code, you can use the {product-short} RBAC feature to define policies in a declarative fashion by using a simple CSV based format. You can define the policies by using {product-short} web interface or REST API instead of editing the CSV directly.
1210

13-
RBAC on {product-short} is built on top of the Permissions framework, which defines RBAC policies in code.
14-
Rather than defining policies in code,
15-
the {product-short} RBAC feature allows you
16-
to define policies in a declarative fashion using a simple CSV based format.
17-
You can define the policies by using {product-short} web interface or REST API, rather than editing the CSV directly.
11+
An administrator can define authorizations in {product-short} by taking the following steps:
1812

19-
To define authorizations in {product-short}:
13+
. Enable the RBAC feature and give authorized users access to the feature.
2014

21-
. The {product-short} administrator enables and gives access to the RBAC feature.
22-
23-
. You define your roles and policies by combining the following methods:
15+
. Define roles and policies by combining the following methods:
2416

2517
* The {product-short} policy administrator uses the {product-short} web interface or REST API.
2618
* The {product-short} administrator edits the main {product-short} configuration file.
@@ -59,4 +51,3 @@ include::modules/authorization/con-user-stats-rhdh.adoc[leveloffset=+1]
5951

6052

6153
include::modules/authorization/proc-download-user-stats-rhdh.adoc[leveloffset=+2]
62-

titles/authentication/master.adoc

-1
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,3 @@ include::artifacts/attributes.adoc[]
1010
//{abstract}
1111

1212
include::assemblies/assembly-enabling-authentication.adoc[]
13-

titles/authorization/master.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ include::artifacts/attributes.adoc[]
33
:imagesdir: images
44
:title: Authorization in {product}
55
:subtitle: Configuring authorization by using role based access control (RBAC) in {product}
6-
:abstract: As a {product} platform engineer, you can manage authorizations of other users by using role based access control (RBAC) to meet the specific needs of your organization.
6+
:abstract: {product} administrators can use role-based access control (RBAC) to manage authorizations of other users.
77
//[id="{context}"]
88
//= {title}
99

0 commit comments

Comments
 (0)