Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit0b714a0

Browse files
authored
Update install and admin topics (#302)
1 parent98f6b3f commit0b714a0

File tree

16 files changed

+132
-149
lines changed

16 files changed

+132
-149
lines changed

‎_data/nav.yml‎

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
-title:CI/CD quick starts
2222
url:"/ci-quickstart"
2323
sub-pages:
24-
-title:CI pipeline quick start
24+
-title:Pipeline quick start
2525
url:"/create-ci-pipeline"
2626
-title:Kubernetes deployment quick start
2727
url:"/deploy-to-kubernetes"
@@ -48,7 +48,7 @@
4848

4949

5050

51-
-title:Dashboards &Insights
51+
-title:Dashboards &insights
5252
url:"/dashboards"
5353
pages:
5454
-title:Home dashboard
@@ -58,7 +58,7 @@
5858

5959

6060

61-
-title:CI/CDGuides
61+
-title:CI/CDguides
6262
url:"/ci-cd-guides"
6363
pages:
6464
-title:Building your app
@@ -439,7 +439,7 @@
439439
url:"/what-is-the-codefresh-yaml"
440440

441441

442-
-title:Workflows
442+
-title:ArgoWorkflows
443443
url:"/workflows"
444444
pages:
445445
-title:Creating workflows
@@ -453,7 +453,7 @@
453453
-title:Sharing file systems
454454
url:"/sharing-file-system"
455455

456-
-title:CI/CD testing
456+
-title:Testing
457457
url:"/testing"
458458
pages:
459459
-title:Unit tests
@@ -471,23 +471,18 @@
471471
-title:SonarQube scanning
472472
url:"/sonarqube-integration"
473473

474-
-title:Clients
475-
url:"/clients"
476-
pages:
477-
-title:Download CLI
478-
url:"/csdp-cli"
479474

480475

481476
-title:Installation
482477
url:"/installation"
483478
pages:
484-
-title:Environments
479+
-title:Options
485480
url:"/installation-options"
486-
-title:Runtime architectures
481+
-title:Architecture
487482
url:"/runtime-architecture"
488-
-title:CodefreshRunner
483+
-title:Runner
489484
url:"/codefresh-runner"
490-
-title:On-Premises installation
485+
-title:On-Premises
491486
url:"/codefresh-on-prem"
492487
-title:On-Premises upgrade
493488
url:"/codefresh-on-prem-upgrade"
@@ -504,6 +499,8 @@
504499
url:"/managed-cluster"
505500
-title:Add Git Sources to to GitOps Runtimes
506501
url:"/git-sources"
502+
-title:Download/upgrade GitOps CLI
503+
url:"/upgrade-gitops-cli"
507504

508505

509506
-title:Administration
@@ -535,6 +532,8 @@
535532
-title:Single Sign-On
536533
url:/single-sign-on
537534
pages:
535+
-title:Single sign-on overview
536+
url:/single-sign-on
538537
-title:Common configuration
539538
url:/team-sync
540539
-title:OpenID Connect

‎_docs/administration/account-user-management/access-control.md‎

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ toc: true
1414
<!-- needs fine tuning for GitOps as well; all x-refs have to be updated-->
1515
Codefresh provides several complementary ways for access control within an organization:
1616

17-
***Role-based access**:[Role-based access](#users-and-administrators), restricts access to parts of the Codefresh UI intended for account administrators. For example, only an account administrator should be able to change integrations with[git providers]({{site.baseurl}}/docs/integrations/git-providers/) and[cloud services]({{site.baseurl}}/docs/deployments/kubernetes/add-kubernetes-cluster/).
17+
***Role-based access**:[Role-based access]({{site.baseurl}}/docs/administration/account-user-management/add-users/#users-in-codefresh), restricts access to parts of the Codefresh UI intended for account administrators. For example, only an account administrator should be able to change integrations with[git providers]({{site.baseurl}}/docs/integrations/git-providers/) and[cloud services]({{site.baseurl}}/docs/integrations/kubernetes/#connect-a-kubernetes-cluster).
1818

19-
***Attribute-based access control (ABAC)**: Policy-based access control via attributes (ABAC), restricts access to[Kubernetes clustersand pipelines](#access-to-kubernetes-clusters-and-pipelines). This option allows account administrators to define exactly which teams have access to which clusters and pipelines. For example, access to production clusters can be granted only to a subset of trusted developers/operators. On the other hand, access to a QA/staging cluster can be less strict.
19+
***Attribute-based access control (ABAC)**: Policy-based access control via attributes (ABAC), restricts access to[AddKubernetes clusterswith policy attributes](##add-kubernetes-clusters-with-policy-attributes). This option allows account administrators to define exactly which teams have access to which clusters and pipelines. For example,you can grantaccess to production clusters only to a subset of trusted developers/operators. On the other hand, access to a QA/staging cluster can be less strict.
2020

21-
***Git-repository access**: Restrict the Git repositories used to load[pipeline definitions](#pipeline-definition-restrictions).
21+
***Git-repository access**: Restrict the Git repositories used to load[pipeline definitions](##enabledisable-access-to-pipeline-yamls-by-source).
2222

2323

2424
##Role-based access for users and administrators
@@ -47,14 +47,14 @@ The table below lists the functionality available for role-based access.
4747
|View Docker images|`User` and`Admin`|
4848
|Inspect text reports|`User` and`Admin`|
4949
|[Git Integrations]({{site.baseurl}}/docs/integrations/git-providers/)|`Admin`|
50-
|[Externaldocker registry settings]({{site.baseurl}}/docs/docker-registries/external-docker-registries/)|`Admin`|
51-
|[External Helm repositories]({{site.baseurl}}/docs/new-helm/add-helm-repository/)|`Admin`|
52-
|[Cloud provider settings]({{site.baseurl}}/docs/deployments/kubernetes/add-kubernetes-cluster/)|`Admin`|
50+
|[ExternalDocker registry settings]({{site.baseurl}}/docs/integrations/docker-registries/)|`Admin`|
51+
|[External Helm repositories]({{site.baseurl}}/docs/deployments/helm/add-helm-repository/)|`Admin`|
52+
|[Cloud provider settings]({{site.baseurl}}/docs//integrations/kubernetes/#connect-a-kubernetes-cluster)|`Admin`|
5353
|[Cloud storage settings]({{site.baseurl}}/docs/testing/test-reports/#connecting-your-storage-account)|`Admin`|
54-
|[Shared configuration]({{site.baseurl}}/docs/configure-ci-cd-pipeline/shared-configuration/)|`Admin`|
54+
|[Shared configuration]({{site.baseurl}}/docs/pipelines/shared-configuration/)|`Admin`|
5555
|[API token generation]({{site.baseurl}}/docs/integrations/codefresh-api/#authentication-instructions)|`Admin`|
56-
|[SSO Settings]({{site.baseurl}}/docs/administration/single-sign-on/)|`Admin`|
57-
|[Runtime environment selection]({{site.baseurl}}/docs/configure-ci-cd-pipeline/pipelines/#pipeline-settings)|`Admin`|
56+
|[SSO Settings]({{site.baseurl}}/docs/single-sign-on/)|`Admin`|
57+
|[Runtime environment selection]({{site.baseurl}}/docs/pipelines/pipelines/#pipeline-settings)|`Admin`|
5858
|[Slack settings]({{site.baseurl}}/docs/integrations/notifications/slack-integration/)|`Admin`|
5959
|[Audit logs]({{site.baseurl}}/docs/administration/audit-logs/)|`Admin`|
6060
|ABAC for Kubernetes clusters|`Admin`|
@@ -92,7 +92,7 @@ You can assign multiple tags to each cluster, making it easy to define multiple
9292
%}
9393

9494
**Before you begin**
95-
* If needed,[add a Kubernetes cluster]({{site.baseurl}}/docs/deployments/kubernetes/add-kubernetes-cluster/)
95+
* If needed,[add a Kubernetes cluster]({{site.baseurl}}/docs//integrations/kubernetes/#connect-a-kubernetes-cluster)
9696

9797
**How to**
9898

@@ -109,6 +109,8 @@ You can assign multiple tags to each cluster, making it easy to define multiple
109109
caption="Assigning tags to a cluster"
110110
max-width="60%"
111111
%}
112+
113+
{:start="3"}
112114
1. Click**Add** and type in the tag.
113115
1. Continue to add tags and when finished, click**Save**.
114116

@@ -119,11 +121,11 @@ You can assign multiple tags to each cluster, making it easy to define multiple
119121
Similar to Kubernetes clusters, you can also add tags to specific pipelines.
120122

121123
**Before you begin**
122-
* If needed,[create aCIpipeline]({{site.baseurl}}/docs/pipelines/pipelines/)
124+
* If needed,[create a pipeline]({{site.baseurl}}/docs/pipelines/pipelines/)
123125

124126
**How to**
125127

126-
1. In the Codefresh UI,go to[Pipelines](https://g.codefresh.io/pipelines/all/){:target="\_blank"}.
128+
1. In the Codefresh UI,from Pipelines in the sidebar, select[Pipelines](https://g.codefresh.io/pipelines/all/){:target="\_blank"}.
127129
1. In the row with the target pipline, click the context menu for the pipeline, and then select**Edit tags**.
128130
1. Type in the new tag, press Enter, and continue to add the tags you need.
129131
1. When finished, click**Save**.
@@ -149,7 +151,7 @@ For each rule you define, select:
149151

150152

151153
**Before you begin**
152-
* Make sure you have[created at least one team]({{site.baseurl}}/docs/administration/add-users/#create-a-team-in-codefresh)
154+
* Make sure you have[created at least one team]({{site.baseurl}}/docs/administration/account-user-management/add-users/#teams-in-codefresh)
153155

154156
**How to**
155157
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
@@ -177,23 +179,23 @@ For each rule you define, select:
177179
*`Update` - can see and edit existing allowed cluster resources (which means also perform[installation, removal and rollbacks of Helm charts]({{site.baseurl}}/docs/new-helm/helm-best-practices/)). Tags are managed from account settings, so this permission doesn’t apply to it currently.
178180
*`Delete` - cluster removal requires someone to be account administrator anyway so currently this permission isn’t really necessary.
179181

180-
For pipelines:
182+
**For pipelines:**
181183

182184
*`Create` - can only create new pipelines, not see, edit (which includes tagging them) or delete them. This permission should also go hand in hand with additional permissions like read/edit untagged pipelines.
183185
*`Read` - view allowed pipelines only.
184186
*`Update` - see and edit allowed pipelines only (including tagging them).
185187
*`Delete` - can delete allowed pipelines only.
186188
*`Run` - can run allowed pipelines only.
187-
*`Approve` - resume pipelines that are waiting for manual[approval]({{site.baseurl}}/docs/codefresh-yaml/steps/approval/).
188-
*`Debug` - allow the usage of the[pipeline debugger]({{site.baseurl}}/docs/configure-ci-cd-pipeline/debugging-pipelines/).
189+
*`Approve` - resume pipelines that are waiting for manual[approval]({{site.baseurl}}/docs/pipelines/steps/approval/).
190+
*`Debug` - allow the usage of the[pipeline debugger]({{site.baseurl}}/docs/pipelines/debugging-pipelines/).
189191

190192

191193

192194
##Git-repository access restrictions
193195

194-
By default, users can load pipeline definitions when[creating a pipeline]({{site.baseurl}}/docs/configure-ci-cd-pipeline/pipelines/), from the inline editor, or any private or public Git repository.
196+
By default, users can load pipeline definitions when[creating a pipeline]({{site.baseurl}}/docs/pipelines/pipelines/), from the inline editor, or any private or public Git repository.
195197

196-
You can change the default behavior to restrict loadingCIpipeline definitions from specific Git repositories or completely disable loading the definitions from all Git repositories.
198+
You can change the default behavior to restrict loading pipeline definitions from specific Git repositories or completely disable loading the definitions from all Git repositories.
197199

198200
###Enable/disable access to pipeline YAMLs by source
199201
Enable or disable access to pipeline definition YAMLs based on the source of the YAML. These global settings are effective for all pipelines in the account and enables or disables that method of pipeline creation from the Codefresh UI.
@@ -203,6 +205,7 @@ pipeline definitions from:
203205
* Any Git repository connected to Codefresh
204206
***Any** public URL
205207

208+
206209
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
207210
1. From Configuration on the sidebar, select[**Pipeline Settings**](https://g.codefresh.io/account-admin/account-conf/pipeline-settings){:target="\_blank"}.
208211

@@ -215,8 +218,9 @@ pipeline definitions from:
215218
max-width="80%"
216219
%}
217220

221+
{:start="3"}
218222
1. Turn on or off the options as needed.
219-
1. Continue with
223+
220224

221225
###Define access to Git repositories for pipeline YAMLs
222226
If access to pipeline definitions are enabled for Git repositories, you can configure fine-grained restrictions through the integrations settings for your[Git provider]({{site.baseurl}}/docs/integrations/git-providers/).
@@ -244,5 +248,5 @@ If access to pipeline definitions are enabled for Git repositories, you can conf
244248

245249

246250
##Related articles
247-
[Codefresh installation options]({{site.baseurl}}/docs/administration/installation-security/)
251+
[Codefresh installation options]({{site.baseurl}}/docs/installation/installation-options/)
248252
[Managing your Kubernetes cluster]({{site.baseurl}}/docs/deployments/kubernetes/manage-kubernetes/)

‎_docs/administration/account-user-management/add-users.md‎

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,24 +6,26 @@ sub_group: account-user-management
66
toc:true
77
---
88

9-
Once you have created a Codefresh account, you can add any number of users to collaborate on repositories, workflows, and pipelines, and teams of users.
9+
Once you have created a Codefresh account, you can add any number of users to collaborate on repositories, workflows, and pipelines, and teams of users.
10+
11+
1012
You can then create teams in Codefresh to group users who share a common denominator, such as the same permissions, access to the same functionality, or roles. Teams make it easy for administrators to both define and manage items shared by multiple users in an orgranization.
1113

1214

1315
##Users in Codefresh
14-
Adding a user requires assigning a role to define access to account resources, and optionally, selecting an SSO provider for the user:
16+
Adding a userto an accountrequires assigning a role to define access to account resources, and optionally, selecting an SSO provider for the user:
1517

1618
***Role**: Defines the user's access level to the resources in the account.
1719
***User**: The default. With this role, users can work with your repositories and pipelines, but cannot change settings
1820
on clusters, docker registries, git integrations, shared configurations etc.
19-
***Administrator**:User withthis rolehave full access toyour accountand can change all your settings, so make sure that they are trusted colleagues.
21+
***Administrator**:Withthis role, usershave full access toaccounts,and can change all settings, so make sure that they are trusted colleagues.
2022
For guidelines on access control, see[Access control]({{site.baseurl}}/docs/administration/account-user-management/access-control/).
2123
***SSO**: By default, SSO is not enabled for users. If required, explicitly select the SSO provider. For an overview of SSO, see[Single Sign on]({{site.baseurl}}/docs/single-sign-on/).
2224

2325

2426
###Add a user to a Codefresh account
2527
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
26-
1. On the sidebar, from Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/account-admin/collaborators/users){:target="\_blank"}.
28+
1. On the sidebar, from Access & Collaboration select[**Users & Teams**](https://g.codefresh.io/account-admin/collaborators/users){:target="\_blank"}.
2729
1. Select**Users**, and then select**+[Add User]**.
2830
1. Type the**User's email address**, and click**Invite**.
2931
<!---add screenshot-->
@@ -45,10 +47,10 @@ Once you add a user to your Codefresh account, you can do the following to manag
4547

4648

4749
##Teams in Codefresh
48-
Teams are users who share the same permissions, roles, oras required and defined according to company processes. Teams allow you to enforce access control through ABAC (Attribute Based Access Control).
50+
Teams are users who share the same permissions, roles, orrequirements defined according to company processes. Teams allow you to enforce access control through ABAC (Attribute Based Access Control).
4951
By default, there are two teams:
5052
* Users
51-
*Admins with users[invited as collaborators]({{site.baseurl}}/docs/accounts/assign-a-user-to-a-team/)
53+
* Admins with users[invited as collaborators](#assign-a-user-to-a-team)
5254

5355
>Only Enterprise customers can add new teams. Other Codefresh plans can only use the predefined*Users* and*Admin* teams.[Contact us](https://codefresh.io/contact-us/){:target="\_blank"} to upgrade to an Enterprise plan.
5456
@@ -84,10 +86,11 @@ As an administrator, you can optionally define session timeouts to automatically
8486

8587
>The maximum duration for inactivity is 30 days. Inactive users are warned 15 minutes before they are logged out.
8688
87-
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
89+
1. In the Codefresh UI, on the toolbar, click the**Settings** icon, and then select**Account Settings**.
8890
1. On the sidebar, from Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/account-admin/collaborators/users){:target="\_blank"}.
8991
1. Select**Security**.
9092
1. For**User Session**, add the timeout duration in minutes/hours/days.
93+
1. To restrict invitations to specific email domains, below User Invitations, turn on**Restrict inviting additional users..** and then in the**Email domains**, type in the domains to allow, one per line.
9194

9295
{% include image.html
9396
lightbox="true"
@@ -98,18 +101,14 @@ As an administrator, you can optionally define session timeouts to automatically
98101
max-width="90%"
99102
%}
100103

101-
{:start="5"}
102-
1. To restrict invitations to specific email domains, in the**Email domains** field below User Invitations, type in the domains to allow, one per line.
103-
104104
##Troubleshoot add users
105105

106-
*[User is prompted to enter an organization name](https://support.codefresh.io/hc/en-us/articles/360020177959-User-is-prompted-to-enter-an-organization-name)
107-
*[Account invitation not permitting login](https://support.codefresh.io/hc/en-us/articles/360015251000-Account-invitation-not-permitting-login)
108-
106+
*[User is prompted to enter an organization name](https://support.codefresh.io/hc/en-us/articles/360020177959-User-is-prompted-to-enter-an-organization-name){:target="\_blank"}
107+
*[Account invitation not permitting login](https://support.codefresh.io/hc/en-us/articles/360015251000-Account-invitation-not-permitting-login){:target="\_blank"}
109108
<!--this is already mentioned as inline refs; add other topics-->
110109

111110
##Related articles
112111
[Access control]({{site.baseurl}}/docs/administration/account-user-management/access-control/)
113112
[Single Sign on]({{site.baseurl}}/docs/single-sign-on/)
114-
[OAuth authentication for Git providers]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup)
113+
[Setting upOAuth authentication for Git providers]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup)
115114

‎_docs/administration/account-user-management/audit.md‎

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title:"Audit logs"
3-
description:"Get a list of all actions in Codefresh"
2+
title:"Auditing actions in Codefresh"
3+
description:"Getlogs of all actions in Codefresh"
44
group:administration
55
sub_group:account-user-management
66
redirect_from:
@@ -13,7 +13,7 @@ The time frames covered by audit logs depends on the pricing tier of your Codefr
1313

1414
The audit log includes:
1515
* UI actions from users
16-
*[CLI](https://codefresh-io.github.io/cli/) invocations
16+
*[CLI](https://codefresh-io.github.io/cli/){:target="\_blank"} invocations
1717
* Any[external integrations]({{site.baseurl}}/docs/integrations/codefresh-api/) used with Codefresh
1818

1919
You can:
@@ -106,6 +106,6 @@ Export all audited events, both Audits and Triggers, to a `CSV` file, for offli
106106

107107

108108
##Related articles
109-
[Codefresh installation options]({{site.baseurl}}/docs/installation/installation-security/)
109+
[Codefresh installation options]({{site.baseurl}}/docs/installation/installation-options/)
110110
[Configuring access Control]({{site.baseurl}}/docs/administration/account-user-management/access-control/)
111-
[Codefresh API]({{site.baseurl}}/docs/integrations/codefresh-api/)
111+
[Codefresh API integration]({{site.baseurl}}/docs/integrations/codefresh-api/)

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp