Skip to content

Commit 45d543f

Browse files
authored
Merge pull request #102707 from jneczypor/OSDOCS-17351
OSDOCS-17351: Correct module within OCM
2 parents afa1148 + ac5e906 commit 45d543f

6 files changed

+91
-63
lines changed
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
// Module included in the following assemblies:
2+
//
3+
// ocm/ocm-overview.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="ocm-accesscontrol-tab-cluster-roles-access_{context}"]
7+
= Cluster roles and access
8+
9+
[role="_abstract"]
10+
You can create a `dedicated-admins` role for {product-short-name} clusters or `cluster-admins` role for {product-title} clusters.
11+
12+
.Procedure
13+
. Click the **Add user** button.
14+
. Enter the ID of the user you want to grant cluster admin access.
15+
. Select the appropriate group for your user. Either `dedicated-admins` for {product-short-name} clusters, or `cluster-admins` for
16+
ifdef::openshift-rosa[]
17+
{rosa-classic-short}
18+
endif::openshift-rosa[]
19+
ifdef::openshift-rosa-hcp[]
20+
{rosa-short}
21+
endif::openshift-rosa-hcp[]
22+
clusters.
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
// Module included in the following assemblies:
2+
//
3+
// ocm/ocm-overview.adoc
4+
5+
:_mod-docs-content-type: CONCEPT
6+
[id="ocm-accesscontrol-tab-identity-providers_{context}"]
7+
= Identity providers
8+
9+
[role="_abstract"]
10+
You can create your cluster's identity provider in this section. See the _Additional resources_ for more information.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
// Module included in the following assemblies:
2+
//
3+
// ocm/ocm-overview.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="ocm-accesscontrol-tab-ocm-roles-access_{context}"]
7+
= OCM roles and access
8+
9+
[role="_abstract"]
10+
Use the following procedure to grant roles on the cluster.
11+
12+
.Prerequisites
13+
14+
* You must be the cluster owner or have the correct permissions to grant roles.
15+
16+
.Procedure
17+
18+
. Click the **Grant role** button.
19+
. Enter the Red Hat account login for the user that you want to grant a role on the cluster.
20+
. Select the role from following options:
21+
** **Cluster editor** allows users or groups to manage or configure the cluster.
22+
** **Cluster viewer** allows users or groups to view cluster details only.
23+
ifdef::openshift-rosa[]
24+
** **Cluster autoscaler editor** allows users or groups to manage and configure the cluster autoscaler settings.
25+
endif::openshift-rosa[]
26+
** **Identity provider editor** allows users or groups to manage and configure the identity providers.
27+
** **Machine pool editor** allows users or groups to manage and configure the machine pools.
28+
. Click the **Grant role** button on the dialog box.
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
// Module included in the following assemblies:
2+
//
3+
// ocm/ocm-overview.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="ocm-accesscontrol-tab-transfer-ownership_{context}"]
7+
= Transfer ownership
8+
9+
[role="_abstract"]
10+
You can transfer your cluster to another user.
11+
12+
[NOTE]
13+
====
14+
Once you transfer cluster ownership, you lose access to the cluster.
15+
====
16+
17+
.Procedure
18+
19+
. Select **Initiate transfer**.
20+
. Enter the user name, account ID, and organization ID of the user that you are transferring the cluster to.
21+
. Select **Initiate transfer**.

modules/ocm-accesscontrol-tab.adoc

Lines changed: 2 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -2,70 +2,9 @@
22
//
33
// ocm/ocm-overview.adoc
44

5-
:_mod-docs-content-type: PROCEDURE
5+
:_mod-docs-content-type: CONCEPT
66
[id="ocm-accesscontrol-tab_{context}"]
77
= Access control tab
88

99
[role="_abstract"]
10-
The **Access control** tab allows the cluster owner to set up an identity provider, grant elevated permissions, and grant roles to other users.
11-
12-
[id="ocm-accesscontrol-tab-identity-providers_{context}"]
13-
== Identity providers
14-
15-
You can create your cluster's identity provider in this section. See the _Additional resources_ for more information.
16-
17-
[id="ocm-accesscontrol-tab-cluster-roles-access_{context}"]
18-
== Cluster roles and acess
19-
20-
You can create a `dedicated-admins` role for {product-short-name} clusters or `cluster-admins` role for {product-title} clusters.
21-
22-
.Procedure
23-
. Click the **Add user** button.
24-
. Enter the ID of the user you want to grant cluster admin access.
25-
. Select the appropriate group for your user. Either `dedicated-admins` for {product-short-name} clusters, or `cluster-admins` for
26-
ifdef::openshift-rosa[]
27-
{rosa-classic-short}
28-
endif::openshift-rosa[]
29-
ifdef::openshift-rosa-hcp[]
30-
{rosa-short}
31-
endif::openshift-rosa-hcp[]
32-
clusters.
33-
34-
[id="ocm-accesscontrol-tab-ocm-roles-access_{context}"]
35-
== OCM roles and access
36-
.Prerequisites
37-
38-
* You must be the cluster owner or have the correct permissions to grant roles on the cluster.
39-
40-
.Procedure
41-
42-
. Click the **Grant role** button.
43-
. Enter the Red Hat account login for the user that you wish to grant a role on the cluster.
44-
. Select the role from following options:
45-
** **Cluster editor** allows users or groups to manage or configure the cluster.
46-
** **Cluster viewer** allows users or groups to view cluster details only.
47-
ifdef::openshift-rosa[]
48-
** **Cluster autoscaler editor** allows users or groups to manage and configure the cluster autoscaler settings.
49-
endif::openshift-rosa[]
50-
** **Identity provider editor** allows users or groups to manage and configure the identity providers.
51-
** **Machine pool editor** allows users or groups to manage and configure the machine pools.
52-
. Click the **Grant role** button on the dialog box.
53-
54-
ifdef::openshift-rosa[]
55-
[id="ocm-accesscontrol-tab-transfer-ownership_{context}"]
56-
== Transfer ownership
57-
58-
You can transfer your cluster to another user.
59-
60-
[NOTE]
61-
====
62-
Once you transfer cluster ownership, you lose access to the cluster.
63-
====
64-
65-
.Procedure
66-
67-
. Select **Initiate transfer**.
68-
. Enter the user name, account ID, and organization ID of the user that you are transferring the cluster to.
69-
. Select **Initiate transfer**.
70-
71-
endif::openshift-rosa[]
10+
The **Access control** tab allows the cluster owner to set up an identity provider, grant elevated permissions, and grant roles to other users.

ocm/ocm-overview.adoc

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,14 @@ include::modules/ocm-cluster-tabs.adoc[leveloffset=+1]
3636

3737
include::modules/ocm-overview-tab.adoc[leveloffset=+2]
3838
include::modules/ocm-accesscontrol-tab.adoc[leveloffset=+2]
39+
include::modules/ocm-accesscontrol-tab-identity-providers.adoc[leveloffset=+3]
40+
include::modules/ocm-accesscontrol-tab-cluster-roles-access.adoc[leveloffset=+3]
41+
include::modules/ocm-accesscontrol-tab-ocm-roles-access.adoc[leveloffset=+3]
42+
43+
ifdef::openshift-rosa[]
44+
include::modules/ocm-accesscontrol-tab-tranfer-ownership.adoc[leveloffset=+3]
45+
endif::openshift-rosa[]
46+
3947
include::modules/ocm-addons-tab.adoc[leveloffset=+2]
4048
include::modules/ocm-cluster-history-tab.adoc[leveloffset=+2]
4149
include::modules/ocm-networking-tab-concept.adoc[leveloffset=+2]

0 commit comments

Comments
 (0)