Skip to content

Commit 10f1a68

Browse files
micheleRPclaude
andcommitted
DOC-2123: Style cleanup on May 2026 What's New entry
- Replace 2 em dashes with parentheses and split sentences. - Tighten passive "ACLs are managed per principal" lead-in. - Align "Allow all operations" caveat phrasing with acl.adoc. - Reword regex example "for example" comma comma into a cleaner semicolon construction. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
1 parent 39e8a0f commit 10f1a68

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

modules/get-started/pages/whats-new-cloud.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ This page lists new features added to Redpanda Cloud.
1010

1111
=== Redpanda Console: redesigned Security page
1212

13-
Redpanda Console has a redesigned Security page with three tabs *Users*, *Roles*, and *Permissions*and ACLs are managed per principal on dedicated detail pages.
13+
Redpanda Console has a redesigned Security page with three tabs (*Users*, *Roles*, and *Permissions*). Each user and role has a detail page for managing its permissions.
1414

15-
* The *Users* tab lists each user with their assigned roles and a count of their ACLs. Filter the list by name using regular expressions, for example `^prod-` to match every user starting with `prod-`.
16-
* Open a user (or a role) to manage their permissions on a dedicated detail page. The *ACLs* section shows one row per rule (type, resource, operation, permission, host) and supports three actions:
15+
* The *Users* tab lists each user with their assigned roles and a count of their ACLs. Filter the list by name using regular expressions; for example, `^prod-` matches every user starting with `prod-`.
16+
* Open a user or role to manage permissions on its detail page. The *ACLs* section shows one row per rule (type, resource, operation, permission, host) and supports three actions:
1717
** *+ Add ACL* opens a focused form for one rule (resource type, pattern type, resource name, operation, permission, host).
18-
** *Allow all operations* grants full wildcard access across all resource types in a single step — convenient for testing.
18+
** *Allow all operations* grants full wildcard access across all resource types in a single step. Use this for testing only; it is too broad for production.
1919
** Select rows with the checkboxes and click *Delete selected* to remove ACLs in bulk.
2020
* The *Permissions* tab is a unified, cluster-wide view of every principal with ACLs. Each row shows direct ACL counts and ACLs inherited from roles, with a red badge highlighting any principal that has Deny rules. Expand a row to see all of that principal's ACLs in one table: direct rules first, then sections labeled *VIA ROLE: <role-name>* for each role they inherit from. Search across principals, resources, and roles, or click *Create ACL* to add a rule from scratch.
2121

0 commit comments

Comments
 (0)