Skip to content

Commit 200fe83

Browse files
committed
more title fixes
Signed-off-by: Michal Wasilewski <[email protected]>
1 parent 8455bb8 commit 200fe83

File tree

7 files changed

+87
-87
lines changed

7 files changed

+87
-87
lines changed

docs/concepts/authorization/assigning-roles-api-keys.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# API Key Role Bindings
1+
# API key role bindings
22

33
[API](./../../integrations/api.md#spacelift-api-key-token) keys can receive roles through three methods:
44

@@ -9,9 +9,9 @@
99
!!! note "Immediate Role Changes"
1010
Except for Login Policies, role assignments and changes to roles take effect immediately (they force re-authentication if needed).
1111

12-
## Assigning Roles
12+
## Assigning roles
1313

14-
### Assigning Roles to API Keys directly using the Web UI
14+
### Assigning roles to API keys directly using the web UI
1515

1616
1. Prerequisites
1717
1. The selected management strategy for your organization must be User Management
@@ -32,11 +32,11 @@
3232
2. **Select Space**: Choose the space where the role applies
3333
3. **Save Assignment**: Confirm the role assignment
3434

35-
### Assigning Roles to API Keys directly using the terraform provider
35+
### Assigning roles to API keys directly using the terraform provider
3636

3737
Refer to [Spacelift Terraform provider documentation](https://registry.terraform.io/providers/spacelift-io/spacelift/latest/docs) for more details).
3838

39-
### Assigning Roles to API Keys directly using the Login Policies
39+
### Assigning roles to API keys directly using the login policies
4040

4141
1. Prerequisites
4242
1. The selected management strategy for your organization must be Login Policies
@@ -58,7 +58,7 @@ roles[space][role_id] {
5858
}
5959
```
6060

61-
#### By Key Name
61+
#### By key name
6262

6363
```opa
6464
package spacelift
@@ -75,7 +75,7 @@ roles["infrastructure"]["provisioner-role-id"] {
7575
}
7676
```
7777

78-
#### By Key Pattern
78+
#### By key pattern
7979

8080
```opa
8181
package spacelift
@@ -92,7 +92,7 @@ roles["monitoring"]["reader-role-id"] {
9292
}
9393
```
9494

95-
#### Separate Keys per Environment
95+
#### Separate keys per environment
9696

9797
```opa
9898
package spacelift
@@ -119,7 +119,7 @@ roles["production"]["limited-deployer-role-id"] {
119119
}
120120
```
121121

122-
#### Multi-Environment Keys
122+
#### Multi-environment keys
123123

124124
```opa
125125
package spacelift
@@ -137,7 +137,7 @@ roles[space]["cross-env-role-id"] {
137137
}
138138
```
139139

140-
#### CI/CD Pipeline Keys
140+
#### CI/CD pipeline keys
141141

142142
```opa
143143
package spacelift
@@ -160,7 +160,7 @@ roles["applications"]["jenkins-deployer-role-id"] {
160160
}
161161
```
162162

163-
#### Infrastructure Tools
163+
#### Infrastructure tools
164164

165165
```opa
166166
package spacelift
@@ -183,7 +183,7 @@ roles["kubernetes"]["k8s-operator-role-id"] {
183183
}
184184
```
185185

186-
#### Conditional API Key Access
186+
#### Conditional API key access
187187

188188
```opa
189189
package spacelift
@@ -212,7 +212,7 @@ is_deployment_window {
212212
}
213213
```
214214

215-
#### IP-Restricted API Keys
215+
#### IP-restricted API keys
216216

217217
```opa
218218
package spacelift
@@ -238,11 +238,11 @@ is_secure_network {
238238
}
239239
```
240240

241-
### Assigning Roles to API Keys using IdP Groups
241+
### Assigning roles to API keys using IdP groups
242242

243243
See [IdP Group Role Bindings](assigning-roles-groups.md) for details on how to assign roles to IdP groups. Once a role is assigned to an IdP group, all actors (api keys and users that your identity provider reports as being members of that group) will inherit the assigned roles.
244244

245-
## Removing An API Key Role Binding
245+
## Removing an API key role binding
246246

247247
1. Navigate to API Key Management
248248
1. Click your name in the bottom left corner of the Spacelift interface
@@ -258,15 +258,15 @@ See [IdP Group Role Bindings](assigning-roles-groups.md) for details on how to a
258258
2. Click the **Unassign** button from the dropdown
259259
3. Confirm the removal
260260

261-
## Multiple Roles
261+
## Multiple roles
262262

263263
Actors can have multiple roles across different spaces:
264264

265265
- Different roles in different spaces for varied access levels
266266
- Multiple roles in the same space (permissions are additive)
267267
- Roles inherited from group membership plus individual assignments
268268

269-
## Getting Role IDs
269+
## Getting role IDs
270270

271271
To use custom roles in login policies, you need their role IDs:
272272

@@ -277,7 +277,7 @@ To use custom roles in login policies, you need their role IDs:
277277

278278
## Troubleshooting
279279

280-
### Common Issues
280+
### Common issues
281281

282282
**API Key Authentication Failures**:
283283

docs/concepts/authorization/assigning-roles-groups.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
# IdP Group Role Bindings
1+
# IdP group role bindings
22

33
IdP groups can receive roles through direct group assignment. Assign roles to the entire group, which automatically applies to all members of that group.
44

5-
## Assigning Roles
5+
## Assigning roles
66

7-
### Assigning Roles to IdP Groups using the Web UI
7+
### Assigning roles to IdP groups using the web UI
88

99
1. Prerequisites
1010
1. The selected management strategy for your organization must be User Management
@@ -26,11 +26,11 @@ IdP groups can receive roles through direct group assignment. Assign roles to th
2626
2. Click the **Manage Roles** button
2727
3. This opens the group role assignment interface
2828

29-
### Assigning Roles to IdP Groups using the terraform provider
29+
### Assigning roles to IdP groups using the terraform provider
3030

3131
Refer to the [Spacelift Terraform provider documentation](https://registry.terraform.io/providers/spacelift-io/spacelift/latest/docs/resources/idp_group_mapping) for detailed instructions on creating IdP group mappings programmatically.
3232

33-
### Assigning Roles to IdP Groups using the Login Policies
33+
### Assigning roles to IdP groups using the login policies
3434

3535
1. Prerequisites
3636
1. The selected management strategy for your organization must be Login Policies
@@ -49,7 +49,7 @@ roles[space][role_id] {
4949
}
5050
```
5151

52-
#### Individual Group Assignment
52+
#### Individual group assignment
5353

5454
```opa
5555
package spacelift
@@ -67,7 +67,7 @@ roles["frontend"]["developer-role-id"] {
6767
}
6868
```
6969

70-
#### Multiple Teams, Same Role
70+
#### Multiple teams, same role
7171

7272
```opa
7373
package spacelift
@@ -89,7 +89,7 @@ roles["infrastructure"]["platform-role-id"] {
8989
}
9090
```
9191

92-
#### Hierarchical Team Access
92+
#### Hierarchical team access
9393

9494
```opa
9595
package spacelift
@@ -116,7 +116,7 @@ roles[space]["team-lead-role-id"] {
116116
}
117117
```
118118

119-
#### Department-Based Access
119+
#### Department-based access
120120

121121
```opa
122122
package spacelift
@@ -141,7 +141,7 @@ roles[space]["security-auditor-role-id"] {
141141
}
142142
```
143143

144-
#### Project and Functional Groups
144+
#### Project and functional groups
145145

146146
```opa
147147
package spacelift
@@ -169,7 +169,7 @@ roles[space]["security-role-id"] {
169169
}
170170
```
171171

172-
#### Multi-Condition Team Assignment
172+
#### Multi-condition team assignment
173173

174174
```opa
175175
package spacelift
@@ -188,7 +188,7 @@ roles["production"]["prod-deployer-role-id"] {
188188

189189
## Troubleshooting
190190

191-
### Common Issues
191+
### Common issues
192192

193193
**Group Permissions Not Working**:
194194

@@ -203,7 +203,7 @@ roles["production"]["prod-deployer-role-id"] {
203203
- Permissions are additive across group memberships
204204
- Regular audit of group role combinations
205205

206-
### Debugging Steps
206+
### Debugging steps
207207

208208
1. **Verify Group Membership**: Check user is member of expected groups in IdP
209209
2. **Validate Role Assignment**: Confirm group has correct role assignments

docs/concepts/authorization/assigning-roles-users.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# User Role Bindings
1+
# User role bindings
22

33
Users can get permissions from three sources:
44

@@ -9,9 +9,9 @@ Users can get permissions from three sources:
99
!!! note "Immediate Role Changes"
1010
Except for Login Policies, role assignments and changes to roles take effect immediately (they force re-authentication if needed).
1111

12-
## Assigning Roles
12+
## Assigning roles
1313

14-
### Assigning Roles to Users directly using the Web UI
14+
### Assigning roles to users directly using the web UI
1515

1616
1. Prerequisites
1717
1. The selected management strategy for your organization must be User Management
@@ -32,11 +32,11 @@ Users can get permissions from three sources:
3232
2. **Select Space**: Choose the space where the role applies
3333
3. **Save Assignment**: Click **Add** to confirm the assignment
3434

35-
### Assigning Roles to Users directly using the terraform provider
35+
### Assigning roles to users directly using the terraform provider
3636

3737
Refer to [Spacelift Terraform provider documentation](https://registry.terraform.io/providers/spacelift-io/spacelift/latest/docs) for more details).
3838

39-
### Assigning Roles to Users directly using the Login Policies
39+
### Assigning roles to users directly using the login policies
4040

4141
1. Prerequisites
4242
1. The selected management strategy for your organization must be Login Policies
@@ -54,7 +54,7 @@ allow { input.session.member }
5454
roles[space_name][role_id] { condition }
5555
```
5656

57-
#### Individual User Assignment
57+
#### Individual user assignment
5858

5959
```opa
6060
package spacelift
@@ -76,7 +76,7 @@ roles["staging"]["developer-role-id"] {
7676
}
7777
```
7878

79-
#### Multiple Users with Same Role
79+
#### Multiple users with same role
8080

8181
```opa
8282
package spacelift
@@ -96,7 +96,7 @@ roles["production"]["senior-developer-role-id"] {
9696
}
9797
```
9898

99-
#### Environment-Based Access
99+
#### Environment-based access
100100

101101
```opa
102102
package spacelift
@@ -123,7 +123,7 @@ roles[space]["lead-developer-role-id"] {
123123
}
124124
```
125125

126-
#### Time-Based Access
126+
#### Time-based access
127127

128128
```opa
129129
package spacelift
@@ -151,7 +151,7 @@ is_business_hours {
151151
weekend := {"Saturday", "Sunday"}
152152
```
153153

154-
#### IP-Based Access
154+
#### IP-based access
155155

156156
```opa
157157
package spacelift
@@ -175,11 +175,11 @@ is_office_network {
175175
}
176176
```
177177

178-
### Assigning Roles to Users via IdP Groups
178+
### Assigning roles to users via IdP groups
179179

180180
See [IdP Group Role Bindings](assigning-roles-groups.md) for details on how to assign roles to IdP groups. Once a role is assigned to an IdP group, all actors (api keys and users that your identity provider reports as being members of that group) will inherit the assigned roles.
181181

182-
## Removing A User Role Binding
182+
## Removing a user role binding
183183

184184
1. Navigate to User Management:
185185
1. Click your name in the bottom left corner of the Spacelift interface
@@ -195,15 +195,15 @@ See [IdP Group Role Bindings](assigning-roles-groups.md) for details on how to a
195195
2. Click the **Unassign** button from the dropdown
196196
3. Confirm the removal
197197

198-
## Multiple Roles
198+
## Multiple roles
199199

200200
Actors can have multiple roles across different spaces:
201201

202202
- Different roles in different spaces for varied access levels
203203
- Multiple roles in the same space (permissions are additive)
204204
- Roles inherited from group membership plus individual assignments
205205

206-
## Getting Role IDs
206+
## Getting role IDs
207207

208208
To use custom roles in login policies, you need their role IDs:
209209

@@ -214,7 +214,7 @@ To use custom roles in login policies, you need their role IDs:
214214

215215
## Troubleshooting
216216

217-
### Common Issues
217+
### Common issues
218218

219219
**User Cannot See Resources**:
220220

0 commit comments

Comments
 (0)