Skip to content

Commit 38fab55

Browse files
committed
linter fixes
Signed-off-by: Michal Wasilewski <[email protected]>
1 parent 1282629 commit 38fab55

File tree

1 file changed

+31
-24
lines changed

1 file changed

+31
-24
lines changed

docs/concepts/authorization/assigning-roles-users.md

Lines changed: 31 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -15,22 +15,22 @@ Users can get permissions from three sources:
1515

1616
1. Prerequisites
1717
1. The selected management strategy for your organization must be User Management
18-
1. User must be invited to the Spacelift organization
19-
1. You must have appropriate permissions to manage user roles
20-
1. Target spaces must exist where you want to assign roles
21-
1. Navigate to User Management:
18+
2. User must be invited to the Spacelift organization
19+
3. You must have appropriate permissions to manage user roles
20+
4. Target spaces must exist where you want to assign roles
21+
2. Navigate to User Management:
2222
1. Click your name in the bottom left corner of the Spacelift interface
2323
2. Select **Organization Settings**
2424
3. Navigate to **Users** in the **Identity Management** section
2525
4. Find the user you want to modify
26-
2. Access Role Management
26+
3. Access Role Management
2727
1. Click on the user's row in the user list
2828
2. Click the **Manage Roles** button
2929
3. This opens the role assignment interface
30-
3. Assign Roles
30+
4. Assign Roles
3131
1. **Select Role**: Choose from predefined roles or custom roles
32-
1. **Select Space**: Choose the space where the role applies
33-
1. **Save Assignment**: Click **Add** to confirm the assignment
32+
2. **Select Space**: Choose the space where the role applies
33+
3. **Save Assignment**: Click **Add** to confirm the assignment
3434

3535
### Assigning Roles to Users directly using the terraform provider
3636

@@ -40,9 +40,10 @@ Refer to [Spacelift Terraform provider documentation](https://registry.terraform
4040

4141
1. Prerequisites
4242
1. The selected management strategy for your organization must be Login Policies
43-
1. You must have appropriate permissions to create or modify login policies
44-
1. Understanding of OPA/Rego policy language
45-
1. Use the `roles` rule to assign roles to users:
43+
2. You must have appropriate permissions to create or modify login policies
44+
3. Understanding of OPA/Rego policy language
45+
2. Use the `roles` rule to assign roles to users:
46+
4647
```opa
4748
package spacelift
4849
@@ -52,8 +53,10 @@ allow { input.session.member }
5253
# Role assignment syntax
5354
roles[space_name][role_id] { condition }
5455
```
55-
1. Examples of role assignments
56+
57+
3. Examples of role assignments
5658
1. Individual User Assignment:
59+
5760
```opa
5861
package spacelift
5962
@@ -73,7 +76,9 @@ roles["staging"]["developer-role-id"] {
7376
input.session.login == "[email protected]"
7477
}
7578
```
76-
1. Multiple Users with Same Role:
79+
80+
2. Multiple Users with Same Role:
81+
7782
```opa
7883
package spacelift
7984
@@ -91,7 +96,9 @@ roles["production"]["senior-developer-role-id"] {
9196
senior_engineers[input.session.login]
9297
}
9398
```
94-
1. Environment-Based Access:
99+
100+
3. Environment-Based Access:
101+
95102
```opa
96103
package spacelift
97104
@@ -116,7 +123,9 @@ roles[space]["lead-developer-role-id"] {
116123
all_spaces[space]
117124
}
118125
```
119-
1. Time-Based Access:
126+
127+
4. Time-Based Access:
128+
120129
```opa
121130
package spacelift
122131
@@ -142,7 +151,9 @@ is_business_hours {
142151
143152
weekend := {"Saturday", "Sunday"}
144153
```
145-
1. IP-Based Access:
154+
155+
5. IP-Based Access:
156+
146157
```opa
147158
package spacelift
148159
@@ -165,10 +176,9 @@ is_office_network {
165176
}
166177
```
167178

168-
169179
### Assigning Roles to Users via IdP Groups
170180

171-
See [IdP Group Role Bindings](#idp-group-role-bindings) for details on how to assign roles to IdP groups. Once a role is assigned to an IdP group, all users that your identity provider reports as being members of that group will inherit the assigned roles.
181+
See [IdP Group Role Bindings](assigning-roles-groups.md) for details on how to assign roles to IdP groups. Once a role is assigned to an IdP group, all users that your identity provider reports as being members of that group will inherit the assigned roles.
172182

173183
## Removing A User Role Binding
174184

@@ -182,10 +192,9 @@ See [IdP Group Role Bindings](#idp-group-role-bindings) for details on how to as
182192
2. Click the **Manage Roles** button
183193
3. This opens the role assignment interface
184194
3. Remove Role Assignment
185-
2. Find the role assignment to remove
186-
3. Click the **Unassign** button from the dropdown
187-
4. Confirm the removal
188-
195+
1. Find the role assignment to remove
196+
2. Click the **Unassign** button from the dropdown
197+
3. Confirm the removal
189198

190199
## Multiple Roles
191200

@@ -195,7 +204,6 @@ Actors can have multiple roles across different spaces:
195204
- Multiple roles in the same space (permissions are additive)
196205
- Roles inherited from group membership plus individual assignments
197206

198-
199207
## Getting Role IDs
200208

201209
To use custom roles in login policies, you need their role IDs:
@@ -205,7 +213,6 @@ To use custom roles in login policies, you need their role IDs:
205213
3. Click **Copy ID** from the role detail page
206214
4. Use this ID in your login policy
207215

208-
209216
## Troubleshooting
210217

211218
### Common Issues

0 commit comments

Comments
 (0)