-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A Model for top-level LTS Permission #832
base: main
Are you sure you want to change the base?
A Model for top-level LTS Permission #832
Conversation
Three main pieces of information needed to fully manage an LTS allocation:
1 + 2 grant full control of an allocation What does a steward have that can't be granted by policy? Bucket management. |
Policies are treated like objects, to modify, must delete and put a new version. Must do a get, modify, put cycle to change even a small typo. |
Each person (identity) can be involved with managing multiple allocations, and will need a key set for each one. Each key set may be granted for different roles, depending on the person's functional title (PI, Core Director, everyone else) and their role in the allocation.
|
Let's arrange the text into sections like this:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is good, it needs a bit of tweaking, and I raised a question.
My question: should we merge this with "Bucket Permissions" and call that page "Access Control"? What are your thoughts?
docs/data_management/res/individual_allocation_functional_roles.csv
Outdated
Show resolved
Hide resolved
docs/data_management/res/shared_allocation_functional_roles.csv
Outdated
Show resolved
Hide resolved
docs/data_management/res/individual_allocation_functional_roles.csv
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is great, let's pivot to Identity and Access Management (IAM) instead of Access Control or Permissons. Don't use the term "Access Control" nor "Permissions" since those are S3 concepts we aren't documenting yet.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great work! I think this is the final round of review, probably.
In addition to specific comments, let's be consistent with capitalizing "Core" when referring to the concept of a "Research Core".
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One typo then ready to go.
Pull Request
Overview
Proposed Changes
Related Issues
Fixes #654
Fixes #671