mirror of
https://github.com/rancher/rancher-docs.git
synced 2026-05-06 05:03:27 +00:00
Merge pull request #2290 from btat/product-sync/pr744-security-warning-cluster-members
Sync Product PR #744 (Add security warning for Cluster Members on Cluster and Project Roles page)
This commit is contained in:
+8
-2
@@ -31,11 +31,17 @@ _Cluster roles_ are roles that you can assign to users, granting them access to
|
||||
|
||||
- **Cluster Owner:**
|
||||
|
||||
These users have full control over the cluster and all resources in it.
|
||||
These users have full control over the cluster and all resources in it.
|
||||
|
||||
- **Cluster Member:**
|
||||
|
||||
These users can view most cluster level resources and create new projects.
|
||||
These users can view most cluster level resources and create new projects.
|
||||
|
||||
:::warning
|
||||
|
||||
When a Cluster Member creates a project, the user is automatically assigned [Project Owner privileges](#project-roles). This grants them comprehensive control over the project and its associated resources, including permissions to deploy workloads. Without enforced [Pod Security Standards (PSS) and Pod Security Admission (PSA)](../pod-security-standards.md), a Cluster Member is able to execute privileged containers in the cluster.
|
||||
|
||||
:::
|
||||
|
||||
#### Custom Cluster Roles
|
||||
|
||||
|
||||
+8
-2
@@ -31,11 +31,17 @@ _Cluster roles_ are roles that you can assign to users, granting them access to
|
||||
|
||||
- **Cluster Owner:**
|
||||
|
||||
These users have full control over the cluster and all resources in it.
|
||||
These users have full control over the cluster and all resources in it.
|
||||
|
||||
- **Cluster Member:**
|
||||
|
||||
These users can view most cluster level resources and create new projects.
|
||||
These users can view most cluster level resources and create new projects.
|
||||
|
||||
:::warning
|
||||
|
||||
When a Cluster Member creates a project, the user is automatically assigned [Project Owner privileges](#project-roles). This grants them comprehensive control over the project and its associated resources, including permissions to deploy workloads. Without enforced [Pod Security Standards (PSS) and Pod Security Admission (PSA)](../pod-security-standards.md), a Cluster Member is able to execute privileged containers in the cluster.
|
||||
|
||||
:::
|
||||
|
||||
#### Custom Cluster Roles
|
||||
|
||||
|
||||
+8
-2
@@ -31,11 +31,17 @@ _Cluster roles_ are roles that you can assign to users, granting them access to
|
||||
|
||||
- **Cluster Owner:**
|
||||
|
||||
These users have full control over the cluster and all resources in it.
|
||||
These users have full control over the cluster and all resources in it.
|
||||
|
||||
- **Cluster Member:**
|
||||
|
||||
These users can view most cluster level resources and create new projects.
|
||||
These users can view most cluster level resources and create new projects.
|
||||
|
||||
:::warning
|
||||
|
||||
When a Cluster Member creates a project, the user is automatically assigned [Project Owner privileges](#project-roles). This grants them comprehensive control over the project and its associated resources, including permissions to deploy workloads. Without enforced [Pod Security Standards (PSS) and Pod Security Admission (PSA)](../pod-security-standards.md), a Cluster Member is able to execute privileged containers in the cluster.
|
||||
|
||||
:::
|
||||
|
||||
#### Custom Cluster Roles
|
||||
|
||||
|
||||
+8
-2
@@ -31,11 +31,17 @@ _Cluster roles_ are roles that you can assign to users, granting them access to
|
||||
|
||||
- **Cluster Owner:**
|
||||
|
||||
These users have full control over the cluster and all resources in it.
|
||||
These users have full control over the cluster and all resources in it.
|
||||
|
||||
- **Cluster Member:**
|
||||
|
||||
These users can view most cluster level resources and create new projects.
|
||||
These users can view most cluster level resources and create new projects.
|
||||
|
||||
:::warning
|
||||
|
||||
When a Cluster Member creates a project, the user is automatically assigned [Project Owner privileges](#project-roles). This grants them comprehensive control over the project and its associated resources, including permissions to deploy workloads. Without enforced [Pod Security Standards (PSS) and Pod Security Admission (PSA)](../pod-security-standards.md), a Cluster Member is able to execute privileged containers in the cluster.
|
||||
|
||||
:::
|
||||
|
||||
#### Custom Cluster Roles
|
||||
|
||||
|
||||
+8
-2
@@ -31,11 +31,17 @@ _Cluster roles_ are roles that you can assign to users, granting them access to
|
||||
|
||||
- **Cluster Owner:**
|
||||
|
||||
These users have full control over the cluster and all resources in it.
|
||||
These users have full control over the cluster and all resources in it.
|
||||
|
||||
- **Cluster Member:**
|
||||
|
||||
These users can view most cluster level resources and create new projects.
|
||||
These users can view most cluster level resources and create new projects.
|
||||
|
||||
:::warning
|
||||
|
||||
When a Cluster Member creates a project, the user is automatically assigned [Project Owner privileges](#project-roles). This grants them comprehensive control over the project and its associated resources, including permissions to deploy workloads. Without enforced [Pod Security Standards (PSS) and Pod Security Admission (PSA)](../pod-security-standards.md), a Cluster Member is able to execute privileged containers in the cluster.
|
||||
|
||||
:::
|
||||
|
||||
#### Custom Cluster Roles
|
||||
|
||||
|
||||
+8
-2
@@ -31,11 +31,17 @@ _Cluster roles_ are roles that you can assign to users, granting them access to
|
||||
|
||||
- **Cluster Owner:**
|
||||
|
||||
These users have full control over the cluster and all resources in it.
|
||||
These users have full control over the cluster and all resources in it.
|
||||
|
||||
- **Cluster Member:**
|
||||
|
||||
These users can view most cluster level resources and create new projects.
|
||||
These users can view most cluster level resources and create new projects.
|
||||
|
||||
:::warning
|
||||
|
||||
When a Cluster Member creates a project, the user is automatically assigned [Project Owner privileges](#project-roles). This grants them comprehensive control over the project and its associated resources, including permissions to deploy workloads. Without enforced [Pod Security Standards (PSS) and Pod Security Admission (PSA)](../pod-security-standards.md), a Cluster Member is able to execute privileged containers in the cluster.
|
||||
|
||||
:::
|
||||
|
||||
#### Custom Cluster Roles
|
||||
|
||||
|
||||
Reference in New Issue
Block a user