diff --git a/content/rancher/v2.6/en/admin-settings/rbac/cluster-project-roles/_index.md b/content/rancher/v2.6/en/admin-settings/rbac/cluster-project-roles/_index.md index 2d61e06d057..9383e2d82aa 100644 --- a/content/rancher/v2.6/en/admin-settings/rbac/cluster-project-roles/_index.md +++ b/content/rancher/v2.6/en/admin-settings/rbac/cluster-project-roles/_index.md @@ -39,13 +39,25 @@ The following table lists each built-in custom cluster role available and whethe | Manage Cluster Backups             | ✓ | | | Manage Cluster Catalogs | ✓ | | | Manage Cluster Members | ✓ | | -| Manage Nodes | ✓ | | +| Manage Nodes (see table below) | ✓ | | | Manage Storage | ✓ | | -| View All Projects | ✓ | | +| View All Projects | ✓ | | | View Cluster Catalogs | ✓ | ✓ | | View Cluster Members | ✓ | ✓ | | View Nodes | ✓ | ✓ | +#### Manage Nodes Permissions + +The following table lists the permissions available for the Manage Nodes role in `RKE` and `RKE2`. + +| Manage Nodes Permissions | RKE | RKE2 | +|--------------------------------------------|-------- |--------- | +| SSH Access | ✓ | ✓ | +| Delete Nodes | ✓ | ✓ | +| Scale Clusters Up and Down | ✓ | | +| Scale Up/Down with Edit Cluster Permission | | ✓ | +
+ For details on how each cluster role can access Kubernetes resources, you can go to the **Global** view in the Rancher UI. Then click **Security > Roles** and go to the **Clusters** tab. If you click an individual role, you can refer to the **Grant Resources** table to see all of the operations and resources that are permitted by the role. > **Note:**