Skip to content

Commit 61fda89

Browse files
authored
DOC-1200 Unified impersonation in Cloud (#370)
* DOC-1200 Unified impersonation in Cloud # Conflicts: # modules/security/pages/cloud-authentication.adoc * add glossterms * minor edit * add to list of beta features * DOC-1200 Unified impersonation in Cloud # Conflicts: # modules/security/pages/cloud-authentication.adoc # Conflicts: # modules/security/pages/cloud-authentication.adoc * update edits * fix links * what's new for Nov # Conflicts: # modules/get-started/pages/whats-new-cloud.adoc # Conflicts: # modules/get-started/pages/whats-new-cloud.adoc # Conflicts: # modules/get-started/pages/whats-new-cloud.adoc * remove beta * add custom roles in control plane * remove custom roles this will go in a separate PR in January * fix what's new
1 parent 137a397 commit 61fda89

5 files changed

Lines changed: 103 additions & 51 deletions

File tree

local-antora-playbook.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,6 @@ asciidoc:
3737
- '@redpanda-data/docs-extensions-and-macros/macros/config-ref'
3838
- '@redpanda-data/docs-extensions-and-macros/macros/helm-ref'
3939
- '@redpanda-data/docs-extensions-and-macros/asciidoc-extensions/add-line-numbers-highlights'
40-
- '@redpanda-data/docs-extensions-and-macros/macros/badge'
4140
antora:
4241
extensions:
4342
- require: '@redpanda-data/docs-extensions-and-macros/extensions/generate-rp-connect-info'

modules/get-started/pages/whats-new-cloud.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,12 @@ Shadowing is supported on BYOC and Dedicated clusters running Redpanda version 2
2222

2323
You can now view and export metrics from Serverless clusters to third-party monitoring systems like Prometheus and Grafana. See xref:manage:monitor-cloud.adoc[Monitor Redpanda Cloud] for details on configuring monitoring for your Serverless cluster and xref:reference:public-metrics-reference.adoc[Metrics Reference] for a list of metrics available in Serverless.
2424

25+
=== User impersonation
26+
27+
BYOC and Dedicated clusters now support unified authentication and authorization between the Redpanda Cloud UI and Redpanda with xref:security:cloud-authentication.adoc#user-impersonation[user impersonation]. This means you can authenticate to fine-grained access within Redpanda using the same credentials you use to authenticate to Redpanda Cloud.
28+
29+
With user impersonation, the topics users see in the UI are identical to what they can access with the Cloud API or `rpk`, ensuring consistent permissions across all interfaces and clear auditing of data plane user actions.
30+
2531
=== Redpanda Connect updates
2632

2733
* Tracers:

modules/security/pages/authorization/rbac/rbac.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
= Configure RBAC in the Control Plane
22
:description: Configure RBAC to manage access to organization-level resources like clusters, resource groups, and networks.
33

4-
Use Redpanda Cloud role-based access control (RBAC) in the glossterm:control plane[] to manage and restrict access to resources in your organization. For example, you could grant everyone access to clusters in a development resource group while limiting access to clusters in a production resource group. Or, you could limit access to geographically-dispersed clusters in accordance with data residency laws.
4+
Use Redpanda Cloud role-based access control (RBAC) in the glossterm:control plane[] to manage and restrict access to resources in your organization. For example, you could grant everyone in your organization access to clusters in a development resource group while limiting access to clusters in a production resource group. Or, you could limit access to geographically-dispersed clusters in accordance with data residency laws.
55

66
The following resources can be assigned as the scope of a role:
77

@@ -11,7 +11,7 @@ The following resources can be assigned as the scope of a role:
1111
- Network peerings
1212
- Clusters (Serverless clusters have a different set of permissions from BYOC and Dedicated clusters.)
1313
14-
NOTE: Topics are not included.
14+
NOTE: Topics are not included. For topic-level access control, see xref:security:authorization/rbac/rbac_dp[Configure RBAC in the Data Plane].
1515

1616
You can manage these RBAC configurations with the https://cloud.redpanda.com[Redpanda Cloud UI^] or with the link:/api/doc/cloud-controlplane/[Control Plane API].
1717

modules/security/pages/authorization/rbac/rbac_dp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
= Configure RBAC in the Data Plane
2-
:description: Configure RBAC to manage cluster-level permissions for provisioned users.
2+
:description: Configure RBAC to manage access for provisioned users to cluster-level resources, like topics and consumer groups.
33

44
Use role-based access control (RBAC) in the glossterm:data plane[] to configure cluster-level permissions for provisioned users at scale. RBAC works in conjunction with all supported authentication methods.
55

0 commit comments

Comments
 (0)