docs(rbac): clarify auth_policies:update is sufficient for OIDC policy edits#18805
docs(rbac): clarify auth_policies:update is sufficient for OIDC policy edits#18805
Conversation
…olicies Documents that the auth_policies:update permission alone gates editing OIDC auth policies, regardless of the token types referenced by the policy. Pairs with pulumi/pulumi-service#42376. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Docs ReviewThanks for tightening this scope description. The clarification about OIDC auth policy editing is useful, but the new wording introduces a few small issues worth a second look before merging. Issues1. "Sufficient on its own to edit OIDC auth policies, regardless of the token types they reference." drops its subject and parses awkwardly next to the preceding sentence. Recasting it as a full sentence makes the scope read consistently with the rest of the table. The PR description already calls out the three token types — pulling them into the doc itself spares readers from having to infer what "token types" means in this context. 2. The scope is named Nits
Otherwise
If you'd like another pass after revising, mention @claude. |
|
Your site preview for commit 05efd8a is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-18805-05efd8a0.s3-website.us-west-2.amazonaws.com |
Summary
auth_policies:updaterow in the org-settings RBAC scope reference to clarify that this permission alone is sufficient to edit an OIDC auth policy, regardless of the token types (personal,team,organization) the policy references.