diff --git a/.vscode/aiven.code-snippets b/.vscode/aiven.code-snippets index 437a47628..3821e9f60 100644 --- a/.vscode/aiven.code-snippets +++ b/.vscode/aiven.code-snippets @@ -17,7 +17,7 @@ "prefix": "Required access", "body": [ "## Required access", - "You must be a ${1|[super admin](/docs/platform/howto/make-super-admin),[project admin](/docs/platform/reference/project-member-privileges),[project operator](/docs/platform/reference/project-member-privileges)|} to access this feature." + "You must be a ${1|[super admin](/docs/platform/howto/make-super-admin),[project admin](/docs/platform/concepts/permissions),[project operator](/docs/platform/concepts/permissions)|} to access this feature." ], "description": "Inserts a section with information on what role is needed to access a feature" }, diff --git a/docs/get-started.md b/docs/get-started.md index ef5cf68ab..5e796a13c 100644 --- a/docs/get-started.md +++ b/docs/get-started.md @@ -170,7 +170,7 @@ Add users to groups to streamline access management to your Aiven projects and s description="Create and add users to groups." />
  • Create databases.
  • View service connection information.
  • Remove Aiven for OpenSearch® indexes.
  • Create and change Aiven for Apache Kafka® topics.
  • Create and change Aiven for PostgreSQL® connection pools.
  • Create and change service database users.
  • | | Operator | `operator` | | | Read only | `read_only` | | +| Maintain services | `role:services:maintenance` | | +| Recover services | `role:services:recover` | | Project admin do not have access to organization settings such as billing unless they are also a [super admin](/docs/platform/howto/make-super-admin). @@ -53,5 +55,9 @@ permission apply to the project and all services within it. | Manage project networking | `project:networking:write` | | | View project permissions | `project:permissions:read` | | | View services | `project:services:read` | | +| Manage services | `project:services:write` | | | Manage service configuration | `service:configuration:write` | | +| Access data | `service:data:write` | | | View service logs | `service:logs:read` | **Service logs may contain sensitive information.** | +| View configuration secrets | `service:secrets:read` | | +| Manage service users | `service:users:write` | | diff --git a/docs/platform/concepts/projects.md b/docs/platform/concepts/projects.md index 5d206d816..3da93c263 100644 --- a/docs/platform/concepts/projects.md +++ b/docs/platform/concepts/projects.md @@ -3,4 +3,4 @@ title: Projects --- -Use projects to [create collections](/docs/platform/howto/manage-project) of related services and [manage access](/docs/platform/reference/project-member-privileges) to its services. +Use projects to [create collections](/docs/platform/howto/manage-project) of related services and [manage access](/docs/platform/concepts/permissions) to its services. diff --git a/docs/platform/howto/add-groups-projects.md b/docs/platform/howto/add-groups-projects.md index 922e4eac6..67780019b 100644 --- a/docs/platform/howto/add-groups-projects.md +++ b/docs/platform/howto/add-groups-projects.md @@ -4,7 +4,7 @@ title: Add groups to projects import ConsoleLabel from "@site/src/components/ConsoleIcons" -Give [groups](/docs/platform/howto/manage-groups) of organization users access to a project and the services in it by adding groups to it. When you add a group, you grant permissions to all users in the group by assigning the group [roles](/docs/platform/reference/project-member-privileges) for that specific project. +Give [groups](/docs/platform/howto/manage-groups) of organization users access to a project and the services in it by adding groups to it. When you add a group, you grant permissions to all users in the group by assigning the group [roles and permissions](/docs/platform/concepts/permissions) for that specific project. ## Add groups to a project @@ -20,4 +20,4 @@ the for that group. ## Related pages - [Manage projects](/docs/platform/howto/manage-project) -- [Project member roles](/docs/platform/reference/project-member-privileges) +- [Permissions](/docs/platform/concepts/permissions) diff --git a/docs/platform/howto/add-project-members.md b/docs/platform/howto/add-project-members.md index 567c857d1..408eadcd1 100644 --- a/docs/platform/howto/add-project-members.md +++ b/docs/platform/howto/add-project-members.md @@ -16,7 +16,7 @@ Users can be added individually or as part of a user 1. Select the users or groups to add to the project. -1. Select a **Role**. The [role](/docs/platform/reference/project-member-privileges) +1. Select a **Role**. The [role](/docs/platform/concepts/permissions) will be assigned to all users in all selected groups. 1. Click **Add users** or **Add groups**. diff --git a/docs/platform/howto/make-super-admin.md b/docs/platform/howto/make-super-admin.md index d63404769..6f1702dc1 100644 --- a/docs/platform/howto/make-super-admin.md +++ b/docs/platform/howto/make-super-admin.md @@ -20,4 +20,4 @@ select **Revoke super admin**. ## Related pages - [Manage organization users](/docs/platform/howto/manage-org-users) -- [Project member roles](/docs/platform/reference/project-member-privileges) +- [Permissions](/docs/platform/concepts/permissions) diff --git a/docs/platform/howto/manage-vpc-peering.md b/docs/platform/howto/manage-vpc-peering.md index 8ea9d9f75..9b8203b6d 100644 --- a/docs/platform/howto/manage-vpc-peering.md +++ b/docs/platform/howto/manage-vpc-peering.md @@ -24,7 +24,7 @@ To set up VPC peering for your Aiven project: :::note **Admin** and **operator** - [project member roles](/docs/platform/reference/project-member-privileges) + [project member roles](/docs/platform/concepts/permissions) can create a VPC. ::: diff --git a/docs/platform/reference/project-member-privileges.md b/docs/platform/reference/project-member-privileges.md deleted file mode 100644 index 009292a6c..000000000 --- a/docs/platform/reference/project-member-privileges.md +++ /dev/null @@ -1,36 +0,0 @@ ---- -title: Project roles and permissions -sidebar_label: Project member roles ---- - -When you add users to a project individually or as part of a [group](/docs/platform/howto/manage-groups) you also assign them a role for that project. - -| Role | View services | Create services | Manage services | Connect | Power services on/off | Edit permissions | -| ----------------- | ------------- | --------------- | --------------- | ------- | --------------------- | ---------------------- | -| **Administrator** | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | -| **Operator** | ✅ | ✅ | ✅ | ✅ | ✅ | | -| **Developer** | ✅ | | ✅ | ✅ | | | -| **Read Only** | ✅ | | | | | | - -- **Admin**: Full access to the project and its services. - - Every project has at least one admin user. This role is automatically granted to - users who create a project. - - Does not have access to organization settings such as billing unless they are also - a [super admin](/docs/platform/howto/make-super-admin). - - Can add users and groups to the project. - - Can remove users and groups from the project. - -- **Operator**: Full access to all services in the project. - - Can create new services. - - Cannot make changes to the users, groups, or permissions for a project. -- **Developer**: Allowed to manage services in this project. - - Can make changes to services and databases, for example: - creating databases, connecting to databases, removing Aiven for - OpenSearch® indexes, creating and modifying Aiven for Apache - Kafka® topics, and creating and modifying Aiven for PostgreSQL® - connection pools. - - Can create and change service database users. - - Cannot make changes to the project users, groups, or permissions. - - Cannot make changes that affect billing, such as powering services on or off. -- **Read-only**: Only allowed to view services. - - Cannot make any changes to the project or its services. diff --git a/docs/products/kafka/howto/enable-governance.md b/docs/products/kafka/howto/enable-governance.md index db65a5d00..8a06fdf0b 100644 --- a/docs/products/kafka/howto/enable-governance.md +++ b/docs/products/kafka/howto/enable-governance.md @@ -108,4 +108,4 @@ To change global topic configurations after enabling governance: ## Related pages - [Aiven for Apache Kafka® governance overview](/docs/products/kafka/concepts/governance-overview) -- [Project member roles and permissions](/docs/platform/reference/project-member-privileges) +- [Project member roles and permissions](/docs/platform/concepts/permissions) diff --git a/docs/products/kafka/howto/prevent-full-disks.md b/docs/products/kafka/howto/prevent-full-disks.md index f7b25d106..00c9fb61a 100644 --- a/docs/products/kafka/howto/prevent-full-disks.md +++ b/docs/products/kafka/howto/prevent-full-disks.md @@ -126,7 +126,7 @@ few minutes to remove the associated data files from the disk. Once complete, th access control list (ACL) updates to allow write operations. :::note -[Admin](/docs/platform/reference/project-member-privileges) access is required to +[Admin](/docs/platform/concepts/permissions) access is required to perform this action. ::: diff --git a/static/_redirects b/static/_redirects index bee695cda..6e22ddd87 100644 --- a/static/_redirects +++ b/static/_redirects @@ -77,6 +77,7 @@ /platform/howto/update-tax-status https://aiven.io/docs/platform/concepts/tax-information /platform/ip-addresses https://aiven.io/docs/platform/reference/service-ip-address /platform/privatelink https://aiven.io/docs/platform/howto/use-aws-privatelinks +/platform/reference/project-member-privileges https://aiven.io/docs/platform/concepts/permissions /platform/vpc https://aiven.io/docs/platform/howto/manage-vpc-peering /products/caching/concepts https://aiven.io/docs/docs/products/caching/concepts/high-availability-redis /products/caching/concepts/overview https://aiven.io/docs/products/caching