You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DOC-2123: Style cleanup on May 2026 What's New entry
- Replace 2 em dashes with parentheses and split sentences.
- Tighten passive "ACLs are managed per principal" lead-in.
- Align "Allow all operations" caveat phrasing with acl.adoc.
- Reword regex example "for example" comma comma into a cleaner
semicolon construction.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: modules/get-started/pages/whats-new-cloud.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,12 +10,12 @@ This page lists new features added to Redpanda Cloud.
10
10
11
11
=== Redpanda Console: redesigned Security page
12
12
13
-
Redpanda Console has a redesigned Security page with three tabs — *Users*, *Roles*, and *Permissions* — and ACLs are managed per principal on dedicated detail pages.
13
+
Redpanda Console has a redesigned Security page with three tabs (*Users*, *Roles*, and *Permissions*). Each user and role has a detail page for managing its permissions.
14
14
15
-
* The *Users* tab lists each user with their assigned roles and a count of their ACLs. Filter the list by name using regular expressions, for example `^prod-` to match every user starting with `prod-`.
16
-
* Open a user (or a role) to manage their permissions on a dedicated detail page. The *ACLs* section shows one row per rule (type, resource, operation, permission, host) and supports three actions:
15
+
* The *Users* tab lists each user with their assigned roles and a count of their ACLs. Filter the list by name using regular expressions; for example, `^prod-` matches every user starting with `prod-`.
16
+
* Open a user or role to manage permissions on its detail page. The *ACLs* section shows one row per rule (type, resource, operation, permission, host) and supports three actions:
17
17
** *+ Add ACL* opens a focused form for one rule (resource type, pattern type, resource name, operation, permission, host).
18
-
** *Allow all operations* grants full wildcard access across all resource types in a single step — convenient for testing.
18
+
** *Allow all operations* grants full wildcard access across all resource types in a single step. Use this for testing only; it is too broad for production.
19
19
** Select rows with the checkboxes and click *Delete selected* to remove ACLs in bulk.
20
20
* The *Permissions* tab is a unified, cluster-wide view of every principal with ACLs. Each row shows direct ACL counts and ACLs inherited from roles, with a red badge highlighting any principal that has Deny rules. Expand a row to see all of that principal's ACLs in one table: direct rules first, then sections labeled *VIA ROLE: <role-name>* for each role they inherit from. Search across principals, resources, and roles, or click *Create ACL* to add a rule from scratch.
0 commit comments