diff --git a/docs/sources/administration/roles-and-permissions/access-control/_index.md b/docs/sources/administration/roles-and-permissions/access-control/_index.md index e02fd29a47a..e4fbb02c52b 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/_index.md +++ b/docs/sources/administration/roles-and-permissions/access-control/_index.md @@ -14,6 +14,8 @@ weight: 120 # Role-based access control (RBAC) +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + RBAC provides a standardized way of granting, changing, and revoking access when it comes to viewing and modifying Grafana resources, such as dashboards, reports, and administrative settings. {{< section >}} diff --git a/docs/sources/administration/roles-and-permissions/access-control/assign-rbac-roles.md b/docs/sources/administration/roles-and-permissions/access-control/assign-rbac-roles.md index 923ce7112ba..9e6f1a9c00c 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/assign-rbac-roles.md +++ b/docs/sources/administration/roles-and-permissions/access-control/assign-rbac-roles.md @@ -11,6 +11,8 @@ weight: 40 # Assign RBAC roles +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + In this topic you'll learn how to use the role picker, provisioning, and the HTTP API to assign fixed and custom roles to users and teams. ## Assign fixed roles in the UI using the role picker diff --git a/docs/sources/administration/roles-and-permissions/access-control/configure-rbac.md b/docs/sources/administration/roles-and-permissions/access-control/configure-rbac.md index 0ae2953ddf5..ecdbe17f69d 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/configure-rbac.md +++ b/docs/sources/administration/roles-and-permissions/access-control/configure-rbac.md @@ -9,6 +9,8 @@ weight: 30 # Configure RBAC in Grafana +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + The table below describes all RBAC configuration options. Like any other Grafana configuration, you can apply these options as [environment variables]({{< relref "../../../setup-grafana/configure-grafana/#configure-with-environment-variables" >}}). | Setting | Required | Description | Default | diff --git a/docs/sources/administration/roles-and-permissions/access-control/custom-role-actions-scopes.md b/docs/sources/administration/roles-and-permissions/access-control/custom-role-actions-scopes.md index a207b91e10a..ac80732d59c 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/custom-role-actions-scopes.md +++ b/docs/sources/administration/roles-and-permissions/access-control/custom-role-actions-scopes.md @@ -10,6 +10,8 @@ weight: 80 # RBAC permissions, actions, and scopes +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + A permission is comprised of an action and a scope. When creating a custom role, consider the actions the user can perform and the resource(s) on which they can perform those actions. To learn more about the Grafana resources to which you can apply RBAC, refer to [Resources with RBAC permissions]({{< relref "../#fixed-roles" >}}). diff --git a/docs/sources/administration/roles-and-permissions/access-control/manage-rbac-roles.md b/docs/sources/administration/roles-and-permissions/access-control/manage-rbac-roles.md index fe029d0c53f..1230dd5c2d4 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/manage-rbac-roles.md +++ b/docs/sources/administration/roles-and-permissions/access-control/manage-rbac-roles.md @@ -12,6 +12,8 @@ weight: 50 # Manage RBAC roles +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + This section includes instructions for how to view permissions associated with roles, create custom roles, and update and delete roles. The following example includes the base64 username:password Basic Authorization. You cannot use authorization tokens in the request. diff --git a/docs/sources/administration/roles-and-permissions/access-control/plan-rbac-rollout-strategy.md b/docs/sources/administration/roles-and-permissions/access-control/plan-rbac-rollout-strategy.md index 09f6494ff26..eec31165366 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/plan-rbac-rollout-strategy.md +++ b/docs/sources/administration/roles-and-permissions/access-control/plan-rbac-rollout-strategy.md @@ -11,6 +11,8 @@ weight: 20 # Plan your RBAC rollout strategy +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + An RBAC rollout strategy helps you determine _how_ you want to implement RBAC prior to assigning RBAC roles to users and teams. Your rollout strategy should help you answer the following questions: diff --git a/docs/sources/administration/roles-and-permissions/access-control/rbac-fixed-basic-role-definitions.md b/docs/sources/administration/roles-and-permissions/access-control/rbac-fixed-basic-role-definitions.md index b1cd0e2f972..170f751f607 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/rbac-fixed-basic-role-definitions.md +++ b/docs/sources/administration/roles-and-permissions/access-control/rbac-fixed-basic-role-definitions.md @@ -11,6 +11,8 @@ weight: 70 # RBAC role definitions +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). + The following tables list permissions associated with basic and fixed roles. ## Basic role assignments diff --git a/docs/sources/administration/roles-and-permissions/access-control/rbac-provisioning.md b/docs/sources/administration/roles-and-permissions/access-control/rbac-provisioning.md index 57d5ca9d6f8..1179db3c7d3 100644 --- a/docs/sources/administration/roles-and-permissions/access-control/rbac-provisioning.md +++ b/docs/sources/administration/roles-and-permissions/access-control/rbac-provisioning.md @@ -10,9 +10,9 @@ weight: 60 # Grafana RBAC provisioning -You can create, change or remove [Custom roles]({{< relref "./manage-rbac-roles/#create-custom-roles-using-provisioning" >}}) and create or remove [basic role assignments]({{< relref "./assign-rbac-roles/#assign-a-fixed-role-to-a-basic-role-using-provisioning" >}}), by adding one or more YAML configuration files in the `provisioning/access-control/` directory. +> **Note:** Available in [Grafana Enterprise]({{< relref "../../enterprise/" >}}) and [Grafana Cloud Advanced]({{< ref "/docs/grafana-cloud" >}}). -If you choose to use provisioning to assign and manage role, you must first enable it. +You can create, change or remove [Custom roles]({{< relref "./manage-rbac-roles/#create-custom-roles-using-provisioning" >}}) and create or remove [basic role assignments]({{< relref "./assign-rbac-roles/#assign-a-fixed-role-to-a-basic-role-using-provisioning" >}}), by adding one or more YAML configuration files in the `provisioning/access-control/` directory. Grafana performs provisioning during startup. After you make a change to the configuration file, you can reload it during runtime. You do not need to restart the Grafana server for your changes to take effect.